Obligations; Access control policy; UML profile; UML class diagram; UML state machines; Model based testing
Abstract :
[en] Obligations are mandatory actions that users must perform, addressing access control requirements. To ensure that such obligations are implemented correctly, an automated and systematic testing approach is often recommended. One such approach is Model-Based Testing (MBT) that allows defining cost-effective testing strategies to support rigorous testing via automation. In this paper, we present MBT for obligations by extending the Unified Modeling Language (UML) via a profile called the Obligations Profile. Based on the profile, we define a modeling methodology utilizing the concepts of Obligations Class Diagrams (OCDs) and Obligations State Machines (OSMs), which are standard UML Class Diagrams and UML State Machines with stereotypes from the Obligations Profile. Our methodology, using OCDs and OSMs, is automatically enforced by the validation of constraints defined in the profile. To assess the completeness and applicability of the profile and methodology, we modeled 47 obligations from four different systems. The results of our case study show that we successfully modeled all the obligations and used 75% of the stereotypes that we defined in the profile. In addition, using OCDs and OSMs, we automatically generate executable test cases using a standard state machine structural coverage criterion and common test data generation strategies. The effectiveness of generated test cases is assessed using mutation analysis on two systems, using mutation operators specifically designed for obligation faults. Test case execution killed 75% of the mutants and a careful analysis further suggests that more sophisticated testing strategies must be defined to further improve testing effectiveness.
BRIAND, Lionel ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
LE TRAON, Yves ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Title :
Model-Based Testing of Obligations
Publication date :
2014
Event name :
14th Annual International Conference on Quality Software (QSIC)
Event organizer :
IEEE Reliabil Soc, UT Dallas, IEEE Comp Soc
Event place :
Dallas, United States - Texas
Event date :
OCT 02-03, 2014
Audience :
International
Main work title :
14th Annual International Conference on Quality Software (QSIC)
Publisher :
Ieee Computer Soc, Los Alamitos, Unknown/unspecified
R. Binder, Testing Object-oriented Software Testing: Models, Patterns, and Tools, 1st, Addison-Wesley Professional: 2000
M. Utting, and B. Legeard, Practical model-based testing: a tools approach, Morgan Kaufmann Publishers Inc: San Francisco, 2007
Object Constraint Language. 2014. Available at: http://www.omg.org/spec/OCL/
S. Ali, H. Hemmati, N.E. Holt., E. Arisholm, and L. Briand, Model Transformations as a Strategy to Automate Model-Based Testing-A Tool and Industrial Case Studies, 2010
Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia: Formal enforcement and management of obligation policies, Data & Knowledge Engineering, 71, (1), pp. 127-147, 2012
F.c. Lagarde, H. Espinoza, F.c. Terrier, C. André, and S. Gérard: Leveraging patterns on domain models to improve UML profile definition in: Fundamental Approaches to Software EngineeringSpringer2008, pp. 116-130
T. Weilkiens, Systems engineering with SysML/UML: modeling, analysis, design, Morgan Kaufmann OMG Press: 2011
O.M. Group. Modeling and Analysis of Real-time Embedded Systems Available at: http://www.omg.org/spec/MARTE/1.0/
P. Baker, Model-driven testing: Using the UML testing profile, Springer-Verlag: 2009
J. Park, and R. Sandhu: The UCON ABC usage control model, ACM Transactions on Information and System Security (TISSEC), 7, (1), pp. 128-174, 2004
Smartesting Software. Available at: http://www.smartesting.com/index.php/cms/en/home
Dresden OCL Software. Available at: http://www.dresdenocl.org/index.php/DresdenOCL
S. Ali, M. Iqbal, A. Arcuri, and L. Briand: Generating Test Data from OCL Constraints with Search Techniques, IEEE Transactions on Software Engineering, 39, (10), pp. 1376-1402 2013
J. Kienzle, N. Guelfi, and S. Mustafiz: Crisis management systems: a case study for aspect-oriented modeling in: Transactions on aspect-oriented software development VIISpringer Berlin Heidelberg2010, pp. 1-22
Convivialty and Privacy in Ambient Intelligence Systems-CoPAInS. Available at: http://wwwen.uni.lu/snt/research/serval/projects/copains
Y. Elrakaiby, T. Mouelhi, and Y. Le Traon: Testing obligation policy enforcement using mutation analysis. in. IEEE Fifth International Conference on Software Testing, Verification and Validation, Montreal, 2012 2012 pp. 673-680
Kevoree. Available at: http://kevoree.org/
A.J. Offutt, G. Rothermel, and C. Zapf: An experimental evaluation of selective mutation. in. 15th international conference on Software Engineering, 1993 pp. 100-107
X. Zhang, F. Parisi-Presicce, R. Sandhu, and J. Park: Formal model and policy specification of usage control, ACM Transactions on Information and System Security (TISSEC), 8, (4), pp. 351-387, 2005
S.A. ., L. Briand., and H. Hemmati.: Modeling robustness behavior using aspect-oriented modeling to support robustness testing of industrial systems, Software & Systems Modeling 11, (4), pp. 633-670 2011
C. Bettini, S. Jajodia, X.S. Wang, and D. Wijesekera: Provisions and obligations in policy management and security applications. in. Proceedings of the 28th international conference on Very Large Data Bases 2002 2002 pp. 502-513
K. Irwin, T. Yu, and W.H. Winsborough: On the modeling and analysis of obligations. in. Proceedings of the 13th ACM conference on Computer and communications security New York, 2006 2006 pp. 134-143
P. Gama, and P. Ferreira: Obligation policies: An enforcement platform. in. Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, Lisboa, Portugal, 2005 2005 pp. 203-212
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter: A policy language for distributed usage control in: Computer Security-ESORICS 2007 Lecture Notes in Computer Science Springer Berlin Heidelberg2007, pp. 531-546
L. Kagal, T. Finin, and A. Joshi: A policy language for a pervasive computing environment. in. Proceedings. POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003 2003 pp. 63-74
N. Damianou, N. Dulay, E. Lupu, and M. Sloman: The ponder policy specification language in: Policies for Distributed Systems and NetworksSpringer Berlin Heidelberg2001, pp. 18-38
H. Ferrier-Belhaouari, P. Konopacki, R. Laleau, and M. Frappier: A Design by Contract Approach to Verify Access Control Policies. in. 17th International Conference on Engineering of Complex Computer Systems Paris, 2012 2012 pp. 263-272
D.J. Dougherty, K. Fisler, and S. Krishnamurthi: Obligations and their interaction with programs in: Computer Security-ESORICS 2007Springer Berlin Heidelberg2007, pp. 375-389
W. Mallouli, and A. Cavalli: Testing security rules with decomposable activities. in. 10th IEEE High Assurance Systems Engineering Symposium, Plano, TX 2007 2007 pp. 149-155
D. Xu, M. Sanford, Z. Liu, S. Johnson, M. Emry, B. Brockmueller, and M. To: Testing access control and obligation policies. in. International Conference on Computing, Networking and Communications (ICNC), San Diego, 2013 2013 pp. 540-544
D. Basin, J. Doser, rgen, and T. Lodderstedt: Model driven security: From UML models to access control infrastructures, ACM Trans. Softw. Eng. Methodol., 15, (1), pp. 39-91, 2006
J. Jürjens: UMLsec: Extending UML for secure systems development in: UML 2002-The Unified Modeling LanguageSpringer2002, pp. 412-425
D. Xu: A tool for automated test code generation from high-level Petri nets in: Applications and Theory of Petri NetsSpringer Berlin Heidelberg2011, pp. 308-317
E. Martin, and T. Xie: Automated test generation for access control policies via change-impact analysis. in. Third International Workshop on Software Engineering for Secure Systems, Minneapolis, MN 2007 2007 pp. 5
A. Pretschner, T. Mouelhi, and Y. Le Traon: Model-based tests for access control policies. in. 1st International Conference on Software Testing, Verification, and Validation, Lillehammer 2008 2008 pp. 338-347
Y.L. Traon, T. Mouelhi, and B. Baudry: Testing security policies: going beyond functional testing. in. The 18th IEEE International Symposium on Software Reliability, Trollhattan, 2007 2007 pp. 93-102