Article (Périodiques scientifiques)
Similarity testing for access control
Bertolino, A.; Daoudagh, S.; EL KATEB, Donia et al.
2015In Information and Software Technology, 58, p. 355-372
Peer reviewed vérifié par ORBi
 

Documents


Texte intégral
Similarity testing for access control.pdf
Postprint Éditeur (2.68 MB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Security policies; Similarity; Test prioritization; Budget control; Fault detection; Testing; Access control policies; Exhaustive testing; Mutation analysis; Security mechanism; Security policy; Similarity criteria; Access control
Résumé :
Context: Access control is among the most important security mechanisms, and XACML is the de facto standard for specifying, storing and deploying access control policies. Since it is critical that enforced policies are correct, policy testing must be performed in an effective way to identify potential security flaws and bugs. In practice, exhaustive testing is impossible due to budget constraints. Therefore the tests need to be prioritized so that resources are focused on their most relevant subset. Objective: This paper tackles the issue of access control test prioritization. It proposes a new approach for access control test prioritization that relies on similarity. Method: The approach has been applied to several policies and the results have been compared to random prioritization (as a baseline). To assess the different prioritization criteria, we use mutation analysis and compute the mutation scores reached by each criterion. This helps assessing the rate of fault detection. Results: The empirical results indicate that our proposed approach is effective and its rate of fault detection is higher than that of random prioritization. Conclusion: We conclude that prioritization of access control test cases can be usefully based on similarity criteria. © 2014 Elsevier B.V. All rights reserved.
Disciplines :
Sciences informatiques
Identifiants :
eid=2-s2.0-84914157978
Auteur, co-auteur :
Bertolino, A.;  Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy
Daoudagh, S.;  Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy
EL KATEB, Donia ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
HENARD, Christopher ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
LE TRAON, Yves ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Lonetti, F.;  Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy
Marchetti, E.;  Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy
Mouelhi, T.;  Interdisciplinary Research Centre, SnT, University of Luxembourg, Luxembourg, Luxembourg
PAPADAKIS, Mike ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Similarity testing for access control
Date de publication/diffusion :
2015
Titre du périodique :
Information and Software Technology
ISSN :
0950-5849
eISSN :
1873-6025
Maison d'édition :
Elsevier
Volume/Tome :
58
Pagination :
355-372
Peer reviewed :
Peer reviewed vérifié par ORBi
Disponible sur ORBilu :
depuis le 03 avril 2016

Statistiques


Nombre de vues
430 (dont 24 Unilu)
Nombre de téléchargements
548 (dont 8 Unilu)

citations Scopus®
 
22
citations Scopus®
sans auto-citations
12
OpenCitations
 
21
citations OpenAlex
 
25
citations WoS
 
17

Bibliographie


Publications similaires



Contacter ORBilu