Conformance testing procedures for generating tests from the finite state model representation of Role-Based Access Control (RBAC) policies are proposed and evaluated. A test suite generated using one of these procedures has excellent fault detection ability but is astronomically large. Two approaches to reduce the size of the generated test suite were investigated. One is based on a set of six heuristics and the other directly generates a test suite from the finite state model using random selection of paths in the policy model. Empirical studies revealed that the second approach to test suite generation, combined with one or more heuristics, is most effective in the detection of both first-order mutation and malicious faults and generates...
Context: In modern pervasive applications, it is important to validate access control mechanisms tha...
Verification and testing are the important step for software assurance. However, such crucial and ye...
With the wide use of Role-based Access Control (RBAC), the need for monitoring, evaluation, and veri...
Conformance testing procedures for generating tests from the finite state model representation of Ro...
Access control is essential for safe and secure access to software and hardware resources. Operating...
Abstract Context Access control systems demand rigorous verification and validation approaches, othe...
International audienceWe present a model-based approach to testing access control requirements. By u...
author was on sabbatical leave at ENST Bretagne. Financial and organizational support is gratefully ...
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended ...
Role-based access control is an important access control method for securing computer systems. A rol...
AbstractFault-based conformance testing is a conformance testing strategy that relies on specific fa...
Access control policies are increasingly written in specification lan-guages such as XACML. A dedica...
Abstract. Conformance testing is the problem of constructing a com-plete test suite of inputs based ...
Generation of effective test suite and the evaluation of any given test suite are two of the most e...
Access control policies in software systems can be implemented incorrectly for various reasons. This...
Context: In modern pervasive applications, it is important to validate access control mechanisms tha...
Verification and testing are the important step for software assurance. However, such crucial and ye...
With the wide use of Role-based Access Control (RBAC), the need for monitoring, evaluation, and veri...
Conformance testing procedures for generating tests from the finite state model representation of Ro...
Access control is essential for safe and secure access to software and hardware resources. Operating...
Abstract Context Access control systems demand rigorous verification and validation approaches, othe...
International audienceWe present a model-based approach to testing access control requirements. By u...
author was on sabbatical leave at ENST Bretagne. Financial and organizational support is gratefully ...
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended ...
Role-based access control is an important access control method for securing computer systems. A rol...
AbstractFault-based conformance testing is a conformance testing strategy that relies on specific fa...
Access control policies are increasingly written in specification lan-guages such as XACML. A dedica...
Abstract. Conformance testing is the problem of constructing a com-plete test suite of inputs based ...
Generation of effective test suite and the evaluation of any given test suite are two of the most e...
Access control policies in software systems can be implemented incorrectly for various reasons. This...
Context: In modern pervasive applications, it is important to validate access control mechanisms tha...
Verification and testing are the important step for software assurance. However, such crucial and ye...
With the wide use of Role-based Access Control (RBAC), the need for monitoring, evaluation, and veri...