-
1
-
-
84862306023
-
Automatic XACML requests generation for policy testing
-
submitted to
-
Bertolino, A., Lonetti, F., Daoudagh, S., and Marchetti, E. (2012). Automatic XACML requests generation for policy testing. submitted to The Third International Workshop on Security Testing 2012.
-
(2012)
The Third International Workshop on Security Testing 2012
-
-
Bertolino, A.1
Lonetti, F.2
Daoudagh, S.3
Marchetti, E.4
-
2
-
-
78449304326
-
Systematic XACML request generation for testing purposes
-
Bertolino, A., Lonetti, F., and Marchetti, E. (2010). Systematic XACML Request Generation for Testing Purposes. In Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), pages 3-11.
-
(2010)
Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)
, pp. 3-11
-
-
Bertolino, A.1
Lonetti, F.2
Marchetti, E.3
-
3
-
-
0000673732
-
The AETG system: An approach to testing based on combinatiorial design
-
Cohen, D. M., Dalal, S. R., Fredman, M. L., and Patton, G. C. (1997). The AETG system: An approach to testing based on combinatiorial design. IEEE Trans. on Soft. Eng., 23(7):437-444.
-
(1997)
IEEE Trans. on Soft. Eng.
, vol.23
, Issue.7
, pp. 437-444
-
-
Cohen, D.M.1
Dalal, S.R.2
Fredman, M.L.3
Patton, G.C.4
-
4
-
-
0017959155
-
Hints on test data selection: Help for the practicing programmer
-
DeMillo, R., Lipton, R., and Sayward, F. (1978). Hints on test data selection: Help for the practicing programmer. Computer, 11(4):34-41.
-
(1978)
Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
DeMillo, R.1
Lipton, R.2
Sayward, F.3
-
5
-
-
85088054290
-
Verification and change-impact analysis of access-control policies
-
Fisler, K., Krishnamurthi, S., Meyerovich, L., and Tschantz, M. (2005). Verification and change-impact analysis of access-control policies. In Proc. of ICSE, pages 196-205.
-
(2005)
Proc. of ICSE
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.3
Tschantz, M.4
-
6
-
-
84864058333
-
Designing fast and scalable xacml policy evaluation engines
-
Liu, A. X., Chen, F., Hwang, J., and Xie, T. (2011). Designing fast and scalable xacml policy evaluation engines. IEEE Transactions on Computers, 60(12):1802-1817.
-
(2011)
IEEE Transactions on Computers
, vol.60
, Issue.12
, pp. 1802-1817
-
-
Liu, A.X.1
Chen, F.2
Hwang, J.3
Xie, T.4
-
7
-
-
70350630994
-
Automated test generation for access control policies
-
Martin, E. and Xie, T. (2006). Automated test generation for access control policies. In Supplemental Proc. of ISSRE.
-
(2006)
Supplemental Proc. of ISSRE
-
-
Martin, E.1
Xie, T.2
-
9
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
Martin, E. and Xie, T. (2007b). A fault model and mutation testing of access control policies. In Proc. of WWW, pages 667-676.
-
(2007)
Proc. of WWW
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
11
-
-
0024033855
-
The category-partition method for specifying and generating functional tests
-
Ostrand, T. J. and Balcer, M. J. (1988). The category-partition method for specifying and generating functional tests. Commun. ACM, 31(6):676-686.
-
(1988)
Commun. ACM
, vol.31
, Issue.6
, pp. 676-686
-
-
Ostrand, T.J.1
Balcer, M.J.2
-
12
-
-
50649102597
-
Model-based tests for access control policies
-
Pretschner, A., Mouelhi, T., and Le Traon, Y. (2008). Model-based tests for access control policies. In Proc. of ICST, pages 338-347.
-
(2008)
Proc. of ICST
, pp. 338-347
-
-
Pretschner, A.1
Mouelhi, T.2
Le Traon, Y.3
-
13
-
-
33745905108
-
-
Sun Microsystems (2006). Sun's XACML Implementation. http://sunxacml. sourceforge.net/.
-
(2006)
Sun's XACML Implementation
-
-
-
15
-
-
47349131989
-
Testing security policies: Going beyond functional testing
-
Traon, Y., Mouelhi, T., and Baudry, B. (2007). Testing security policies: going beyond functional testing. In Proc. of ISSRE, pages 93-102.
-
(2007)
Proc. of ISSRE
, pp. 93-102
-
-
Traon, Y.1
Mouelhi, T.2
Baudry, B.3
|