کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
551049 1450775 2015 18 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Similarity testing for access control
ترجمه فارسی عنوان
تست شباهت برای کنترل دسترسی
کلمات کلیدی
شباهت، اولویت بندی تست، سیاست های امنیتی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر تعامل انسان و کامپیوتر
چکیده انگلیسی


• A new approach for access control test prioritization based on similarity.
• Two XACML similarity metrics, one of them exploiting the XACML policy specification.
• An empirical study that compares different techniques to prioritize XACML requests.

ContextAccess control is among the most important security mechanisms, and XACML is the de facto standard for specifying, storing and deploying access control policies. Since it is critical that enforced policies are correct, policy testing must be performed in an effective way to identify potential security flaws and bugs. In practice, exhaustive testing is impossible due to budget constraints. Therefore the tests need to be prioritized so that resources are focused on their most relevant subset.ObjectiveThis paper tackles the issue of access control test prioritization. It proposes a new approach for access control test prioritization that relies on similarity.MethodThe approach has been applied to several policies and the results have been compared to random prioritization (as a baseline). To assess the different prioritization criteria, we use mutation analysis and compute the mutation scores reached by each criterion. This helps assessing the rate of fault detection.ResultsThe empirical results indicate that our proposed approach is effective and its rate of fault detection is higher than that of random prioritization.ConclusionWe conclude that prioritization of access control test cases can be usefully based on similarity criteria.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information and Software Technology - Volume 58, February 2015, Pages 355–372
نویسندگان
, , , , , , , , ,