International audienceThis paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the concretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language ba...
Les politiques de sécurité sont devenues de nos jours un point clé dans toutes les infrastructures m...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
International audienceThis paper is about generating security tests from the Common Criteria express...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
International audienceWe present a model-based approach to testing access control requirements. By u...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
In the next years, smart cards are going to become the main personal identification document in many...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
The work presented in this report deals with the validation of access control dened through security...
This thesis focuses on the issue of security testing of web-applications, considering the internal p...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
AbstractTesting denotes a set of activities that aim at discovering discrepancies between actual and...
Les politiques de sécurité sont devenues de nos jours un point clé dans toutes les infrastructures m...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
International audienceThis paper is about generating security tests from the Common Criteria express...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
International audienceWe present a model-based approach to testing access control requirements. By u...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
In the next years, smart cards are going to become the main personal identification document in many...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
The work presented in this report deals with the validation of access control dened through security...
This thesis focuses on the issue of security testing of web-applications, considering the internal p...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
AbstractTesting denotes a set of activities that aim at discovering discrepancies between actual and...
Les politiques de sécurité sont devenues de nos jours un point clé dans toutes les infrastructures m...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...