Decentralised runtime monitoring for access control systems in cloud federations

MS Ferdous, A Margheri, F Paci… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Cloud federation is an emergent cloud-computing paradigm where partner organisations
share data and services hosted on their own cloud platforms. In this context, it is crucial to …

Emerging software testing technologies

F Lonetti, E Marchetti - Advances in computers, 2018 - Elsevier
Software testing encompasses a variety of activities along the software development
process and may consume a large part of the effort required for producing software. It …

A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

Automated testing of eXtensible Access Control Markup Language‐based access control systems

A Bertolino, S Daoudagh, F Lonetti, E Marchetti… - IET …, 2013 - Wiley Online Library
The trustworthiness of sensitive data needs to be guaranteed and testing is a common
activity among privacy protection solutions, even if quite expensive. Accesses to data and …

Model-based testing of obligatory ABAC systems

S Khamaiseh, P Chapman, D Xu - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Attribute-based access control (ABAC) with obligations is a new technique for achieving fine-
grained access control and accountability. An obligatory ABAC system can be implemented …

Automated coverage-based testing of XACML policies

D Xu, R Shrestha, N Shen - Proceedings of the 23nd ACM on …, 2018 - dl.acm.org
While the standard language XACML is very expressive for specifying fine-grained access
control policies, defects can get into XACML policies for various reasons, such as …

Automated strong mutation testing of XACML policies

D Xu, R Shrestha, N Shen - Proceedings of the 25th ACM Symposium on …, 2020 - dl.acm.org
While the existing methods for testing XACML policies have varying levels of effectiveness,
none of them can reveal the majority of policy faults. The undisclosed faults may lead to …

Towards model-driven development of access control policies for web applications

M Busch, N Koch, M Masi, R Pugliese… - Proceedings of the …, 2012 - dl.acm.org
We introduce a UML-based notation for graphically modeling systems' security aspects in a
simple and intuitive way and a model-driven process that transforms graphical specifications …

A new testing method for xacml 3.0 policy based on abac and data flow

Y Zhang, B Zhang - 2017 13th IEEE International Conference …, 2017 - ieeexplore.ieee.org
In this paper, the authors propose a new data flow based unit testing method. The authors
involved the coverage selection approach with a decision inheritance tree, which can …

An evaluation of software structure metrics

BA Kitchenham - Proceedings COMPSAC 88: The Twelfth Annual …, 1988 - computer.org
Evaluates some software design metrics, based on the information flow metrics of S. Henry
and D. Kafura (1981, 1984), using data from a communications system. The ability of the …