Validation of access control systems (Contributo in volume (capitolo o saggio))

Type
Label
  • Validation of access control systems (Contributo in volume (capitolo o saggio)) (literal)
Anno
  • 2014-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/978-3-319-07452-8_9 (literal)
Alternative label
  • Bertolino A., Le Traon Y., Lonetti F., Marchetti E., Mouelhi T. (2014)
    Validation of access control systems
    Springer, Berlin (Germania) in Engineering Secure Future Internet Services and Systems. Current Research, 2014
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Bertolino A., Le Traon Y., Lonetti F., Marchetti E., Mouelhi T. (literal)
Pagina inizio
  • 210 (literal)
Pagina fine
  • 233 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
  • Grant agreement: 256980 Tipo Progetto: EU_FP7 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://link.springer.com/chapter/10.1007%2F978-3-319-07452-8_9 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • Engineering Secure Future Internet Services and Systems. Current Research (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
  • 8431 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 24 (literal)
Note
  • PuMa (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • CNR-ISTI, Pisa, Italy; University of Luxembourg, Luxembourg; CNR-ISTI, Pisa, Italy; CNR-ISTI, Pisa, Italy; University of Luxembourg, Luxembourg (literal)
Titolo
  • Validation of access control systems (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-3-319-07451-1 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
  • Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli (literal)
Abstract
  • Access Control is among the most important security mechanisms to put in place in order to secure applications, and XACML is the de facto standard for defining access control policies. Due to the complexity of XACML language it is important to perform efficient testing to identify potential security flaws and bugs. However, in practice, exhaustive testing is impossible due to budget constraints. Test cases selection and prioritization are two well-known solutions to maximize the effectiveness of the test suite in terms of discovered faults, reducing as much as possible the required effort for tests execution and results analysis. In this chapter, after providing a survey on validation approaches for XACML based access control systems, we present a coverage based selection strategy and a similarity based test prioritization solution, both applied to XACML test cases. Then we compare the effectiveness of the two approaches in terms of mutation score and number of test cases. Experimental results show that coverage based selection outperforms similarity based prioritization, hinting to future improvements of the proposed approaches. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Autore CNR di
Prodotto
Editore di
Insieme di parole chiave di
data.CNR.it