메뉴 건너뛰기




Volumn 8431, Issue , 2014, Pages 266-286

A toolchain for designing and testing access control policies

Author keywords

[No Author keywords available]

Indexed keywords

COMPLIANCE CONTROL; INFORMATION MANAGEMENT; MOBILE SECURITY;

EID: 84925010520     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-07452-8_11     Document Type: Article
Times cited : (10)

References (40)
  • 1
    • 85067764282 scopus 로고    scopus 로고
    • OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/ access control-xacml-2.0-core-spec-os.pdf.
    • (2005)
  • 2
    • 85067747931 scopus 로고    scopus 로고
    • SDE: Service Development Environment (2014), http://www.nessos-project.eu/sde.
    • (2014)
  • 4
    • 50649102597 scopus 로고    scopus 로고
    • Model-based tests for access control policies
    • Pretschner, A., Mouelhi, T., Le Traon, Y.: Model-based tests for access control policies. In: Proc. of ICST, pp. 338–347 (2008).
    • (2008) Proc. Of ICST , pp. 338-347
    • Pretschner, A.1    Mouelhi, T.2    Le Traon, Y.3
  • 6
    • 80054103183 scopus 로고    scopus 로고
    • Modeling Secure Navigation in Web Information Systems
    • In: Grabis, J., Kirikova, M. (eds.), Springer, Heidelberg
    • Busch, M., Knapp, A., Koch, N.: Modeling Secure Navigation in Web Information Systems. In: Grabis, J., Kirikova, M. (eds.) BIR 2011. LNBIP, vol. 90, pp. 239–253. Springer, Heidelberg (2011).
    • (2011) BIR 2011. LNBIP , vol.90 , pp. 239-253
    • Busch, M.1    Knapp, A.2    Koch, N.3
  • 8
    • 84925012790 scopus 로고    scopus 로고
    • Modeling Security Features of Web Applications
    • In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.), Springer, Heidelberg
    • Busch, M., Koch, N., Suppan, S.: Modeling Security Features of Web Applications. In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.) Engineering Secure Future Internet Services. LNCS, vol. 8431, pp. 119–139. Springer, Heidelberg (2014).
    • (2014) Engineering Secure Future Internet Services. LNCS , vol.8431 , pp. 119-139
    • Busch, M.1    Koch, N.2    Suppan, S.3
  • 10
    • 85067770912 scopus 로고    scopus 로고
    • Sensoria Project: Software Engineering for Service-Oriented Overlay Computers (2011), http://www.sensoria-ist.eu/.
    • (2011)
  • 11
    • 85067779820 scopus 로고    scopus 로고
    • ASCENS: Autonomic Service Component Ensembles (2012), http://www.ascens-ist.eu/.
    • (2012)
  • 12
    • 85067740815 scopus 로고    scopus 로고
    • Eclipse Foundation: Eclipse Modeling Project (2014), http://eclipse.org/modeling/.
    • (2014)
  • 13
    • 85067771843 scopus 로고    scopus 로고
    • Magicdraw
    • No Magic Inc.: Magicdraw (2014), http://www.magicdraw.com/.
    • (2014)
  • 18
    • 85067780110 scopus 로고    scopus 로고
    • Sun Microsystems: Sun’s XACML Implementation (2006), http://sunxacml.sourceforge.net/.
    • (2006)
  • 19
    • 70350212978 scopus 로고    scopus 로고
    • MagicUWE — A CASE Tool Plugin for Modeling Web Applications
    • Gaedke, M., Grossniklaus, M., D´ıaz, O. (eds.), Springer, Heidelberg
    • Busch, M., Koch, N.: MagicUWE — A CASE Tool Plugin for Modeling Web Applications. In: Gaedke, M., Grossniklaus, M., D´ıaz, O. (eds.) ICWE 2009. LNCS, vol. 5648, pp. 505–508. Springer, Heidelberg (2009).
    • (2009) ICWE 2009. LNCS , vol.5648 , pp. 505-508
    • Busch, M.1    Koch, N.2
  • 20
    • 85067755679 scopus 로고    scopus 로고
    • OMG.: XMI 2.1 (2005), http://www.omg.org/spec/XMI/.
    • (2005)
  • 21
    • 85067776197 scopus 로고    scopus 로고
    • Eclipse: XPand (2013), http://wiki.eclipse.org/Xpand.
    • (2013)
  • 22
    • 0000673732 scopus 로고    scopus 로고
    • The AETG system: An approach to testing based on combinatiorial design
    • Cohen, D.M., Dalal, S.R., Fredman M.L., Patton, G.C.: The AETG system: An approach to testing based on combinatiorial design. IEEE Trans. on Soft. Eng. 23(7), 437–444 (1997).
    • (1997) IEEE Trans. On Soft. Eng , vol.23 , Issue.7 , pp. 437-444
    • Cohen, D.M.1    Dalal, S.R.2    Fredman, M.L.3    Patton, G.C.4
  • 23
    • 84880878736 scopus 로고    scopus 로고
    • Automated testing of extensible access control markup language-based access control systems
    • Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Schilders, L.: Automated testing of extensible access control markup language-based access control systems. IET Software 7(4), 203–212 (2013).
    • (2013) IET Software , vol.7 , Issue.4 , pp. 203-212
    • Bertolino, A.1    Daoudagh, S.2    Lonetti, F.3    Marchetti, E.4    Schilders, L.5
  • 24
    • 85067777496 scopus 로고    scopus 로고
    • SDE.: Tutorial (2012), http://sde.pst.ifi.lmu.de/trac/sde/wiki/Tutorial.
    • (2012)
  • 25
    • 85067748048 scopus 로고    scopus 로고
    • OMG.: OCL 2.0 (2011), http://www.omg.org/spec/OCL/2.0/.
    • (2011)
  • 26
    • 84908163748 scopus 로고    scopus 로고
    • Secure Web Engineering supported by an Evaluation Framework
    • Busch, M.: Secure Web Engineering supported by an Evaluation Framework. In: Modelsward 2014. Scitepress (2014).
    • (2014) Modelsward 2014. Scitepress
    • Busch, M.1
  • 27
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002).
    • (2002) UML 2002. LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 29
    • 77949445459 scopus 로고    scopus 로고
    • Schl¨apfer, M.: Automatic Generation of Smart, Security-Aware GUI Models
    • In: Massacci, F., Wallach, D., Zannone, N. (eds.), Springer, Heidelberg
    • Basin, D., Clavel, M., Egea, M., Schl¨apfer, M.: Automatic Generation of Smart, Security-Aware GUI Models. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 201–217. Springer, Heidelberg (2010).
    • (2010) Essos 2010. LNCS , vol.5965 , pp. 201-217
    • Basin, D.1    Clavel, M.2    Egea, M.3
  • 33
    • 33244470893 scopus 로고    scopus 로고
    • Verification and change-impact analysis of access-control policies
    • ACM, New York
    • Fisler, K., Krishnamurthi, S., Meyerovich, L., Tschantz, M.: Verification and change-impact analysis of access-control policies. In: Proc. of ICSE, pp. 196–205. ACM, New York (2005).
    • (2005) Proc. Of ICSE , pp. 196-205
    • Fisler, K.1    Krishnamurthi, S.2    Meyerovich, L.3    Tschantz, M.4
  • 35
    • 57449120523 scopus 로고    scopus 로고
    • Multiple-implementation testing for XACML implementations
    • Li, N., Hwang, J., Xie, T.: Multiple-implementation testing for XACML implementations. In: Proc. of TAV-WEB, pp. 27–33 (2008).
    • (2008) Proc. Of TAV-WEB , pp. 27-33
    • Li, N.1    Hwang, J.2    Xie, T.3
  • 37
    • 47349131989 scopus 로고    scopus 로고
    • Testing security policies: Going beyond functional testing
    • Traon, Y., Mouelhi, T., Baudry, B.: Testing security policies: going beyond functional testing. In: Proc. of ISSRE, pp. 93–102 (2007).
    • (2007) Proc. Of ISSRE , pp. 93-102
    • Traon, Y.1    Mouelhi, T.2    Baudry, B.3
  • 39
    • 37349056999 scopus 로고    scopus 로고
    • Test generation from security policies specified in or-BAC
    • Li, K., Mounier, L., Groz, R.: Test generation from security policies specified in or-BAC. In: Proc. of COMPSAC, pp. 255–260 (2007).
    • (2007) Proc. Of COMPSAC , pp. 255-260
    • Li, K.1    Mounier, L.2    Groz, R.3
  • 40
    • 85067754918 scopus 로고    scopus 로고
    • Eclipse: Acceleo (2014), http://www.eclipse.org/acceleo/.
    • (2014)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.