International audienceThis paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the concretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language ba...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
International audienceWe present a model-based approach to testing access control requirements. By u...
International audienceThis paper is about generating security tests from the Common Criteria express...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
In the next years, smart cards are going to become the main personal identification document in many...
International audienceWe propose a formal framework based on the B method, that supports the develop...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security functional testing is a costly activity typically performed by security evaluation laborato...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
International audienceWe present a model-based approach to testing access control requirements. By u...
International audienceThis paper is about generating security tests from the Common Criteria express...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
In the next years, smart cards are going to become the main personal identification document in many...
International audienceWe propose a formal framework based on the B method, that supports the develop...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security functional testing is a costly activity typically performed by security evaluation laborato...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
International audienceWe present a model-based approach to testing access control requirements. By u...