메뉴 건너뛰기




Volumn , Issue , 2010, Pages 3-11

Systematic XACML request generation for testing purposes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; FAULT DETECTION EFFECTIVENESS; POLICY EVALUATION; SECURITY MECHANISM; TEST INPUTS;

EID: 78449304326     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SEAA.2010.58     Document Type: Conference Paper
Times cited : (41)

References (18)
  • 3
    • 0000673732 scopus 로고    scopus 로고
    • The AETG system: An approach to testing based on combinatiorial design
    • July
    • D. M. Cohen, S. R. Dalal, M. L. Fredman, and G. C. Patton. The AETG system: An approach to testing based on combinatiorial design. IEEE Trans. on Soft. Eng., 23(7):437-444, July 1997.
    • (1997) IEEE Trans. on Soft. Eng. , vol.23 , Issue.7 , pp. 437-444
    • Cohen, D.M.1    Dalal, S.R.2    Fredman, M.L.3    Patton, G.C.4
  • 4
    • 0017959155 scopus 로고
    • Hints on test data selection: Help for the practicing programmer
    • R. DeMillo, R. Lipton, and F. Sayward. Hints on test data selection: Help for the practicing programmer. Computer, 11(4):34-41, 1978.
    • (1978) Computer , vol.11 , Issue.4 , pp. 34-41
    • DeMillo, R.1    Lipton, R.2    Sayward, F.3
  • 5
    • 33244470893 scopus 로고    scopus 로고
    • Verification and change-impact analysis of access-control policies
    • K. Fisler, S. Krishnamurthi, L. Meyerovich, and M. Tschantz. Verification and change-impact analysis of access-control policies. In Proc. of ICSE, pages 196-205, 2005.
    • (2005) Proc. of ICSE , pp. 196-205
    • Fisler, K.1    Krishnamurthi, S.2    Meyerovich, L.3    Tschantz, M.4
  • 6
    • 50649103518 scopus 로고    scopus 로고
    • Test- Driven Assessment of Access Control in Legacy Applications
    • April
    • Y. Le Traon, T. Mouelhi, A. Pretschner, and B. Baudry. Test- Driven Assessment of Access Control in Legacy Applications. In Proc. of ICST, pages 238-247, April 2008.
    • (2008) Proc. of ICST , pp. 238-247
    • Le Traon, Y.1    Mouelhi, T.2    Pretschner, A.3    Baudry, B.4
  • 7
    • 37349056999 scopus 로고    scopus 로고
    • Test generation from security policies specified in or-BAC
    • K. Li, L. Mounier, and R. Groz. Test generation from security policies specified in or-BAC. In Proc. of COMPSAC, pages 255-260, 2007.
    • (2007) Proc. of COMPSAC , pp. 255-260
    • Li, K.1    Mounier, L.2    Groz, R.3
  • 8
    • 57449120523 scopus 로고    scopus 로고
    • Multiple-implementation testing for XACML implementations
    • N. Li, J. Hwang, and T. Xie. Multiple-implementation testing for XACML implementations. In Proc. of TAV-WEB, pages 27-33, 2008.
    • (2008) Proc. of TAV-WEB , pp. 27-33
    • Li, N.1    Hwang, J.2    Xie, T.3
  • 11
    • 38549181721 scopus 로고    scopus 로고
    • Automated test generation for access control policies via change-impact analysis
    • May
    • E. Martin and T. Xie. Automated test generation for access control policies via change-impact analysis. In Proc. of SESS, pages 5-11, May 2007.
    • (2007) Proc. of SESS , pp. 5-11
    • Martin, E.1    Xie, T.2
  • 12
    • 35348900179 scopus 로고    scopus 로고
    • A fault model and mutation testing of access control policies
    • May
    • E. Martin and T. Xie. A fault model and mutation testing of access control policies. In Proc. of WWW, pages 667-676, May 2007.
    • (2007) Proc. of WWW , pp. 667-676
    • Martin, E.1    Xie, T.2
  • 15
    • 0024033855 scopus 로고
    • The category-partition method for specifying and generating functional tests
    • T. J. Ostrand and M. J. Balcer. The category-partition method for specifying and generating functional tests. Commun. ACM, 31(6):676-686, 1988.
    • (1988) Commun. ACM , vol.31 , Issue.6 , pp. 676-686
    • Ostrand, T.J.1    Balcer, M.J.2
  • 16
    • 50649102597 scopus 로고    scopus 로고
    • Model-based tests for access control policies
    • April
    • A. Pretschner, T. Mouelhi, and Y. Le Traon. Model-based tests for access control policies. In Proc. of ICST, pages 338-347, April 2008.
    • (2008) Proc. of ICST , pp. 338-347
    • Pretschner, A.1    Mouelhi, T.2    Le Traon, Y.3
  • 17
    • 33745905108 scopus 로고    scopus 로고
    • Sun Microsystems
    • Sun Microsystems. Sun's XACML Implementation. http://sunxacml. sourceforge.net/, 2006.
    • (2006) Sun's XACML Implementation
  • 18
    • 47349131989 scopus 로고    scopus 로고
    • Testing security policies: Going beyond functional testing
    • November
    • Y. Traon, T. Mouelhi, and B. Baudry. Testing security policies: going beyond functional testing. In Proc. of ISSRE, pages 93-102, November 2007.
    • (2007) Proc. of ISSRE , pp. 93-102
    • Traon, Y.1    Mouelhi, T.2    Baudry, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.