http://www.cnr.it/ontology/cnr/individuo/prodotto/ID295713
Validation of access control systems (Contributo in volume (capitolo o saggio))
- Type
- Label
- Validation of access control systems (Contributo in volume (capitolo o saggio)) (literal)
- Anno
- 2014-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-3-319-07452-8_9 (literal)
- Alternative label
Bertolino A., Le Traon Y., Lonetti F., Marchetti E., Mouelhi T. (2014)
Validation of access control systems
Springer, Berlin (Germania) in Engineering Secure Future Internet Services and Systems. Current Research, 2014
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Bertolino A., Le Traon Y., Lonetti F., Marchetti E., Mouelhi T. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
- Grant agreement: 256980
Tipo Progetto: EU_FP7 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://link.springer.com/chapter/10.1007%2F978-3-319-07452-8_9 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
- Engineering Secure Future Internet Services and Systems. Current Research (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-ISTI, Pisa, Italy; University of Luxembourg, Luxembourg; CNR-ISTI, Pisa, Italy; CNR-ISTI, Pisa, Italy; University of Luxembourg, Luxembourg (literal)
- Titolo
- Validation of access control systems (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-3-319-07451-1 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
- Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli (literal)
- Abstract
- Access Control is among the most important security mechanisms to put in place in order to secure applications, and XACML is the de facto standard for defining access control policies. Due to the complexity of XACML language it is important to perform efficient testing to identify potential security flaws and bugs. However, in practice, exhaustive testing is impossible due to budget constraints. Test cases selection and prioritization are two well-known solutions to maximize the effectiveness of the test suite in terms of discovered faults, reducing as much as possible the required effort for tests execution and results analysis. In this chapter, after providing a survey on validation approaches for XACML based access control systems, we present a coverage based selection strategy and a similarity based test prioritization solution, both applied to XACML test cases. Then we compare the effectiveness of the two approaches in terms of mutation score and number of test cases. Experimental results show that coverage based selection outperforms similarity based prioritization, hinting to future improvements of the proposed approaches. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Autore CNR di
- Prodotto
- Editore di
- Insieme di parole chiave di