2007
DOI: 10.1109/compsac.2007.96
|View full text |Cite
|
Sign up to set email alerts
|

Conformance Checking of Access Control Policies Specified in XACML

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(30 citation statements)
references
References 22 publications
0
30
0
Order By: Relevance
“…At the origin of this work are [8], [9], [10] which study testing access control languages. Other studies proposed techniques and tools for testing the PDP implementation of security policies written in XACML [11], [19] and RBAC [20], [21]. Fisler et al [22] proposes Magrave, a tool for analyzing XACML policies and performing change-impact analysis.…”
Section: B Mutation Resultsmentioning
confidence: 99%
“…At the origin of this work are [8], [9], [10] which study testing access control languages. Other studies proposed techniques and tools for testing the PDP implementation of security policies written in XACML [11], [19] and RBAC [20], [21]. Fisler et al [22] proposes Magrave, a tool for analyzing XACML policies and performing change-impact analysis.…”
Section: B Mutation Resultsmentioning
confidence: 99%
“…In addition, as future work, we plan to perform an empirical study to compare our approach to other similar approaches [25], [26]. In addition, other approaches (like for instance [24], [27], [28]), which are more generic than ours could be also taken into consideration and compared to our proposed approach.…”
Section: Discussionmentioning
confidence: 99%
“…The policy target (lines [5][6][7][8][9][10][11][12] says that this policy applies to any subject, any action, any environment and the "books" resource. This policy has a first rule (ruleA) (lines 13-34) with a target (lines [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33] specifying that this rule applies only to the access requests of a "read" action of "books", and "documents" resources with any environment. The effect of the second rule (ruleB) (lines 35-50) is Permit when the subject is "Julius", the action is "write", the resource and environment are any resource and any environment respectively.…”
Section: Xacml Languagementioning
confidence: 99%
“…In [12] Hu et al propose an approach for conducting conformance checking of access control policies, specified in XACML and they also propose an implementation of conformance checking based on previous XACML policy verification and testing tools. The work is based on a fault model [13], a structural coverage measurement tool for defining policy coverage metrics [15] and a test generator [14], developed by two of the authors in their former work.…”
Section: Testingmentioning
confidence: 99%