10th IEEE High Assurance Systems Engineering Symposium (HASE'07) 2007
DOI: 10.1109/hase.2007.41
|View full text |Cite
|
Sign up to set email alerts
|

Testing Security Rules with Decomposable Activities

Abstract: Abstract-Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Specification and testing of such policies constitute fundamental steps in the development of a secure system. To address both challenges, we propose a framework to describe how modalities such as permissions, prohibitions and obligations -involving decomposable activities-can be integrated in a functional EFSM specification of a system to obtain a new specification of the system that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
(13 reference statements)
0
3
0
Order By: Relevance
“…The second type of works focuses on defining a dedicated language for obligations modeling such as xSPL [23], Obligations Specification Language (OSL) [24], Rei [25], and Ponder Specification Language [26]. Obligations are modeled for several purposes such as static analysis [5,22,27], platform for the enforcement of obligations policies with underlying system [21,23], state-based modeling for verification [28], and software testing [29,30]. There are also works on using UML to model access control infrastructure that does not include the modeling of obligations [31,32] Some contributions in the literature have focused on the model-based testing of obligations.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The second type of works focuses on defining a dedicated language for obligations modeling such as xSPL [23], Obligations Specification Language (OSL) [24], Rei [25], and Ponder Specification Language [26]. Obligations are modeled for several purposes such as static analysis [5,22,27], platform for the enforcement of obligations policies with underlying system [21,23], state-based modeling for verification [28], and software testing [29,30]. There are also works on using UML to model access control infrastructure that does not include the modeling of obligations [31,32] Some contributions in the literature have focused on the model-based testing of obligations.…”
Section: Related Workmentioning
confidence: 99%
“…There are also works on using UML to model access control infrastructure that does not include the modeling of obligations [31,32] Some contributions in the literature have focused on the model-based testing of obligations. They model obligations using different formalisms such as Extended Finite State Machines (EFSM) [29] and Petri Nets (PrT) [30]. In the work of Mallouli and Cavalli [29], EFSMs are used to model access rules and obligations with the objective to identify test objectives.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation