-
2
-
-
78449304326
-
Systematic XACML Request Generation for Testing Purposes
-
A. Bertolino, F. Lonetti, and E. Marchetti, "Systematic XACML Request Generation for Testing Purposes," in Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), 2010, pp. 3-11.
-
Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), 2010
, pp. 3-11
-
-
Bertolino, A.1
Lonetti, F.2
Marchetti, E.3
-
4
-
-
33645964601
-
Evaluating access control policies through model checking
-
Information Security, ser. J. Zhou, J. Lopez, R. Deng, and F. Bao, Eds. Springer Berlin / Heidelberg
-
N. Zhang, M. Ryan, and D. Guelev, "Evaluating access control policies through model checking," in Information Security, ser. Lecture Notes in Computer Science, J. Zhou, J. Lopez, R. Deng, and F. Bao, Eds. Springer Berlin / Heidelberg, 2005, vol. 3650, pp. 446-460.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.3
-
5
-
-
33244455252
-
-
Technical Report 2004-22. Comp. Science Dep., Univ. of California, Santa Barbara, CA
-
G. Hughes and T. Bultan, "Automated verification of access control policies," Technical Report 2004-22. Comp. Science Dep., Univ. of California, Santa Barbara, CA, 2004.
-
(2004)
Automated Verification of Access Control Policies
-
-
Hughes, G.1
Bultan, T.2
-
6
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. Meyerovich, and M. Tschantz, "Verification and change-impact analysis of access-control policies," in Proc. of ICSE, 2005, pp. 196-205.
-
Proc. of ICSE, 2005
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.3
Tschantz, M.4
-
8
-
-
47349131989
-
Testing security policies: Going beyond functional testing
-
Y. Traon, T. Mouelhi, and B. Baudry, "Testing security policies: going beyond functional testing," in Proc. of ISSRE, 2007, pp. 93-102.
-
Proc. of ISSRE, 2007
, pp. 93-102
-
-
Traon, Y.1
Mouelhi, T.2
Baudry, B.3
-
9
-
-
50649102597
-
Model-based tests for access control policies
-
A. Pretschner, T. Mouelhi, and Y. Le Traon, "Model-based tests for access control policies," in Proc. of ICST, 2008, pp. 338-347.
-
Proc. of ICST, 2008
, pp. 338-347
-
-
Pretschner, A.1
Mouelhi, T.2
Le Traon, Y.3
-
10
-
-
0024033855
-
The category-partition method for specifying and generating functional tests
-
T. J. Ostrand and M. J. Balcer, "The category-partition method for specifying and generating functional tests," Commun. ACM, vol. 31, no. 6, pp. 676-686, 1988.
-
(1988)
Commun. ACM
, vol.31
, Issue.6
, pp. 676-686
-
-
Ostrand, T.J.1
Balcer, M.J.2
-
11
-
-
0000673732
-
The AETG system: An approach to testing based on combinatiorial design
-
Jul.
-
D. M. Cohen, S. R. Dalal, M. L. Fredman, and G. C. Patton, "The AETG system: An approach to testing based on combinatiorial design," IEEE Trans. on Soft. Eng., vol. 23, no. 7, pp. 437-444, Jul. 1997.
-
(1997)
IEEE Trans. on Soft. Eng.
, vol.23
, Issue.7
, pp. 437-444
-
-
Cohen, D.M.1
Dalal, S.R.2
Fredman, M.L.3
Patton, G.C.4
-
12
-
-
84862320083
-
-
X-CREATE, http://labsewiki.isti.cnr.it/labse/tools/xcreate/public/main.
-
X-CREATE
-
-
-
14
-
-
0017959155
-
HINTS ON TEST DATA SELECTION: HELP FOR THE PRACTICING PROGRAMMER
-
R. DeMillo, R. Lipton, and F. Sayward, "Hints on test data selection: Help for the practicing programmer," Computer, vol. 11, no. 4, pp. 34-41, 1978. (Pubitemid 8631038)
-
(1978)
Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
DeMillo, R.A.1
Lipton, R.J.2
Sayward, F.G.3
-
15
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
E. Martin and T. Xie, "A fault model and mutation testing of access control policies," in Proc. of WWW, May 2007, pp. 667-676.
-
Proc. of WWW, May 2007
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
16
-
-
33745905108
-
-
Sun Microsystems, "Sun's XACML Implementation,"http://sunxacml. sourceforge.net/, 2006.
-
(2006)
Sun's XACML Implementation
-
-
|