Proceedings of the 2020 European Symposium on Software Engineering 2020
DOI: 10.1145/3393822.3432330
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Development and Testing of Access and Usage Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 30 publications
1
13
0
Order By: Relevance
“…3) Enumeration: if the number of distinct values for p recorded in the log is less than a predefined threshold 6 , then the type of p is an enumeration whose elements are the logged values for p.…”
Section: Step 2: Access Logs Miningmentioning
confidence: 99%
See 3 more Smart Citations
“…3) Enumeration: if the number of distinct values for p recorded in the log is less than a predefined threshold 6 , then the type of p is an enumeration whose elements are the logged values for p.…”
Section: Step 2: Access Logs Miningmentioning
confidence: 99%
“…The scope of these approaches also vary: generating executable test cases (e.g., [57], prioritizing test case execution based on a given test budget constraints (e.g., [54]), localizing faults (e.g., [58]), generating test oracles (e.g., [60,61]); other approaches [62,59] focus on proposing coverage criteria, such as AC rule coverage, rule pair coverage, and modified condition/decision coverage, to measure and ensure the quality of (AC) test suites. Daoudagh et al [6] conducted a systematic literature review on 20 studies that focus on testing of the usage and access control systems inside DevOps processes. The survey reported that many critical AC issues arise from ambiguous or faulty AC specifications.…”
Section: Detection Of Ac Defects and Vulnerabilitiesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we summarize the main proposals applicable during the development and testing process in order to clarify the main research directions of this paper. For more details, we refer to Daoudagh et al, 12 which provides a systematic literature review of the solutions applicable during the access and usage control system continuous development and testing. In the following sections, we first summarize the existing solutions on development and testing of access control mechanisms and then the currently available proposals about continuous development and testing process.…”
Section: Continuous Development and Testingmentioning
confidence: 99%