Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Decentralised runtime monitoring for access control systems in cloud federations
Cloud federation is an emergent cloud-computing paradigm where partner organisations
share data and services hosted on their own cloud platforms. In this context, it is crucial to …
share data and services hosted on their own cloud platforms. In this context, it is crucial to …
Emerging software testing technologies
Software testing encompasses a variety of activities along the software development
process and may consume a large part of the effort required for producing software. It …
process and may consume a large part of the effort required for producing software. It …
A rigorous framework for specification, analysis and enforcement of access control policies
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …
They are defined in terms of access control policies regulating the access to system …
Automated testing of eXtensible Access Control Markup Language‐based access control systems
The trustworthiness of sensitive data needs to be guaranteed and testing is a common
activity among privacy protection solutions, even if quite expensive. Accesses to data and …
activity among privacy protection solutions, even if quite expensive. Accesses to data and …
Model-based testing of obligatory ABAC systems
Attribute-based access control (ABAC) with obligations is a new technique for achieving fine-
grained access control and accountability. An obligatory ABAC system can be implemented …
grained access control and accountability. An obligatory ABAC system can be implemented …
Automated coverage-based testing of XACML policies
While the standard language XACML is very expressive for specifying fine-grained access
control policies, defects can get into XACML policies for various reasons, such as …
control policies, defects can get into XACML policies for various reasons, such as …
Automated strong mutation testing of XACML policies
While the existing methods for testing XACML policies have varying levels of effectiveness,
none of them can reveal the majority of policy faults. The undisclosed faults may lead to …
none of them can reveal the majority of policy faults. The undisclosed faults may lead to …
Towards model-driven development of access control policies for web applications
We introduce a UML-based notation for graphically modeling systems' security aspects in a
simple and intuitive way and a model-driven process that transforms graphical specifications …
simple and intuitive way and a model-driven process that transforms graphical specifications …
A new testing method for xacml 3.0 policy based on abac and data flow
Y Zhang, B Zhang - 2017 13th IEEE International Conference …, 2017 - ieeexplore.ieee.org
In this paper, the authors propose a new data flow based unit testing method. The authors
involved the coverage selection approach with a decision inheritance tree, which can …
involved the coverage selection approach with a decision inheritance tree, which can …
An evaluation of software structure metrics
BA Kitchenham - Proceedings COMPSAC 88: The Twelfth Annual …, 1988 - computer.org
Evaluates some software design metrics, based on the information flow metrics of S. Henry
and D. Kafura (1981, 1984), using data from a communications system. The ability of the …
and D. Kafura (1981, 1984), using data from a communications system. The ability of the …