메뉴 건너뛰기




Volumn 35, Issue 5, 2009, Pages 654-668

Scalable and effective test generation for role-based access control systems

Author keywords

Fault model; Finite state models; First order mutants; Malicious faults; Role Based Access Control (RBAC)

Indexed keywords

FAULT MODEL; FINITE-STATE MODELS; FIRST-ORDER; MALICIOUS FAULTS; ROLE-BASED ACCESS CONTROL;

EID: 73449142778     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2009.35     Document Type: Article
Times cited : (29)

References (30)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • G-J. Ahn and R. Sandhu, "Role-Based Authorization Constraints Specification," ACM Trans. Information and System Security, vol.3, no.4, pp. 207-226, 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 3
    • 0026260631 scopus 로고
    • An optimization technique for protocol conformance test generation based on uio sequences and rural Chinese postman tours
    • Nov.
    • A.V. Aho, A.T. Dahbura, D. Lee, and M.U. Uyar, "An Optimization Technique for Protocol Conformance Test Generation Based on UIO Sequences and Rural Chinese Postman Tours," IEEE Trans. Comm., vol.39, no.11, pp. 1604-1615, Nov. 1991.
    • (1991) IEEE Trans. Comm. , vol.39 , Issue.11 , pp. 1604-1615
    • Aho, A.V.1    Dahbura, A.T.2    Lee, D.3    Uyar, M.U.4
  • 6
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
    • R. Bhatti, A. Ghafoor, E. Bertino, and J.B.D. Joshi, "X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control," ACM Trans. Information and System Security, vol.8, no.2, pp. 187-227, 2005.
    • (2005) ACM Trans. Information and System Security , vol.8 , Issue.2 , pp. 187-227
    • Bhatti, R.1    Ghafoor, A.2    Bertino, E.3    Joshi, J.B.D.4
  • 7
    • 12344337151 scopus 로고    scopus 로고
    • Automated testing of security functions using a combined model & interface driven approach
    • R. Chandramouli and M. Blackburn, "Automated Testing of Security Functions Using a Combined Model & Interface Driven Approach," Proc. 37th Hawaii Int'l Conf. System Sciences, pp. 299- 308, 2004.
    • (2004) Proc. 37th Hawaii Int'l Conf. System Sciences , pp. 299-308
    • Chandramouli, R.1    Blackburn, M.2
  • 8
    • 0017973244 scopus 로고
    • Testing software design modelled by finite state machines
    • May
    • T.S. Chow, "Testing Software Design Modelled by Finite State Machines," IEEE Trans. Software Eng., vol.4, no.3, pp. 178-187, May 1978.
    • (1978) IEEE Trans. Software Eng. , vol.4 , Issue.3 , pp. 178-187
    • Chow, T.S.1
  • 9
    • 0030242266 scopus 로고    scopus 로고
    • The combinatorial design approach to automatic test generation
    • Sept.
    • D.M. Cohen, S.R. Dalal, J. Parelius, and G.C. Patton, "The Combinatorial Design Approach to Automatic Test Generation," IEEE Software, vol.13, no.5, pp. 83-89, Sept. 1996.
    • (1996) IEEE Software , vol.13 , Issue.5 , pp. 83-89
    • Cohen, D.M.1    Dalal, S.R.2    Parelius, J.3    Patton, G.C.4
  • 11
    • 0017959155 scopus 로고
    • Hints on test data selection
    • Apr.
    • R.A. DeMillo, R.J. Lipton, and F.G. Sayward, "Hints on Test Data Selection," Computer, vol.11, no.4, pp. 34-41, Apr. 1978.
    • (1978) Computer , vol.11 , Issue.4 , pp. 34-41
    • Demillo, R.A.1    Lipton, R.J.2    Sayward, F.G.3
  • 17
    • 73449117962 scopus 로고    scopus 로고
    • Conformance checking of RBAC policy and its implementation
    • R.H. Deng, F. Bao, H-H. Pang, and J. Zhou, eds.
    • F. Hansen and V. Oleshchuk, "Conformance Checking of RBAC Policy and Its Implementation," Proc. Information Security Practice and Experience Conf., R.H. Deng, F. Bao, H-H. Pang, and J. Zhou, eds., 2005.
    • (2005) Proc. Information Security Practice and Experience Conf.
    • Hansen, F.1    Oleshchuk, V.2
  • 18
    • 73449116782 scopus 로고    scopus 로고
    • ANSI RBAC Standard, http://ite.gmu.edu/list/journals/tissec/ ANSI+INCITS+359 2004.pdf, 2008.
    • (2008) ANSI RBAC Standard
  • 19
    • 73449107769 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures, http://www.cve.mitre.org/, 2009.
    • (2009)
  • 20
    • 0030211668 scopus 로고    scopus 로고
    • Better verification through symmetry
    • C.N. Ip and D.L. Dill, "Better Verification through Symmetry," Formal Methods System Design, vol.9, nos. 1/2, pp. 41-75, 1996.
    • (1996) Formal Methods System Design , vol.9 , Issue.1-2 , pp. 41-75
    • Ip, C.N.1    Dill, D.L.2
  • 23
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • Nov./Dec.
    • E.C. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol.25, no.6, pp. 852-869, Nov./Dec. 1999.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 25
    • 73449137630 scopus 로고    scopus 로고
    • Scalable and effective test generation for role based access control systems
    • Center for Education and Research in Information Assurance and Security (CERIAS), Purdue Univ.
    • A. Masood, R. Bhatti, A. Ghafoor, and A. Mathur, "Scalable and Effective Test Generation for Role Based Access Control Systems," Technical Report TR 2006-24, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue Univ., 2006.
    • (2006) Technical Report TR 2006-24
    • Masood, A.1    Bhatti, R.2    Ghafoor, A.3    Mathur, A.4
  • 27
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sept.
    • R. Sandhu and P. Samarati, "Access Control: Principles and Practice," IEEE Comm., vol.32, no.9, pp. 40-48, Sept. 1994.
    • (1994) IEEE Comm , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 28
  • 29
    • 0024650136 scopus 로고
    • Formal methods for protocol testing: A detailed study
    • Apr.
    • D.P. Sidhu and T.K. Leung, "Formal Methods for Protocol Testing: A Detailed Study," IEEE Trans. Software Eng., vol.15, no.4, pp. 413-426, Apr. 1989.
    • (1989) IEEE Trans. Software Eng. , vol.15 , Issue.4 , pp. 413-426
    • Sidhu, D.P.1    Leung, T.K.2
  • 30
    • 0031354777 scopus 로고    scopus 로고
    • Software unit test coverage and adequacy
    • Dec.
    • H. Zhu, P.A.V. Hall, and J.H.R. May, "Software Unit Test Coverage and Adequacy," ACM Computing Surveys, vol.29, no.4, pp. 366-427, Dec. 1997.
    • (1997) ACM Computing Surveys , vol.29 , Issue.4 , pp. 366-427
    • Zhu, H.1    Hall, P.A.V.2    May, J.H.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.