Proceedings of the 16th International Conference on World Wide Web 2007
DOI: 10.1145/1242572.1242663
|View full text |Cite
|
Sign up to set email alerts
|

A fault model and mutation testing of access control policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
151
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 127 publications
(152 citation statements)
references
References 26 publications
0
151
0
1
Order By: Relevance
“…For lack of space we do not provide a description beyond their name in the table, and refer to the respective sources for more information. Specifically, PSTT, PSTF, PTT, PTF, RTT, RTF, RCT, RCF, CPC, CRC and CRE have been introduced in [13]), RTT, ANR, and RER in [14], and the remaining ones in [12]. Relying on a more powerful tool than those used so far in literature increases the reliability of the fault detection effectiveness results obtained by our experiment and contributes to depict more realistic situations.…”
Section: B Experiments Setupmentioning
confidence: 85%
See 2 more Smart Citations
“…For lack of space we do not provide a description beyond their name in the table, and refer to the respective sources for more information. Specifically, PSTT, PSTF, PTT, PTF, RTT, RTF, RCT, RCF, CPC, CRC and CRE have been introduced in [13]), RTT, ANR, and RER in [14], and the remaining ones in [12]. Relying on a more powerful tool than those used so far in literature increases the reliability of the fault detection effectiveness results obtained by our experiment and contributes to depict more realistic situations.…”
Section: B Experiments Setupmentioning
confidence: 85%
“…To evaluate the effectiveness of the generated test suites, mutation analysis has been applied on access control policies [13], [14], [12]. The work of [13] has been the first attempt to define a fault model for access control policies and a set of mutation operators manipulating the predicates and logical constructs of target and condition elements of an XACML policy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) If CurrentNode is in a test sequence that has children with an OR relationship, we create the same number of sequences as children of the CurrentNode and replace CurrentNode in each of these sequences with one of the children of the OR relationship. Then, delete the original sequence containing CurrentNode (lines [24][25][26][27][28][29][30][31][32][33][34][35]. The set of test sequences that remains after the substitutions is the final set of test sequences used for test generation.…”
Section: Test Sequence Generation Algorithmmentioning
confidence: 99%
“…The work is based on a fault model [13], a structural coverage measurement tool for defining policy coverage metrics [15] and a test generator [14], developed by two of the authors in their former work. In [16] De Angelis et al discuss access policy testing as a vital function of the trust network, in which users and service providers interact.…”
Section: Testingmentioning
confidence: 99%