2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops 2014
DOI: 10.1109/icstw.2014.49
|View full text |Cite
|
Sign up to set email alerts
|

Coverage-Based Test Cases Selection for XACML Policies

Abstract: Abstract-XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually the correct response. It is therefore important to reduce the manual test effort by automatically selecting the most important requests to be tested. This paper introduces the XACML smart coverage selection approach, based on a proposed XACML policy coverage criterion. The approach is evaluated using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Testing the security of the communication channels includes approaches that check the correct validation of SSL/TLS certificates (e.g., Frankencerts [18]) as well as protocol fuzzers such as SNOOZE [10] or SECFUZZ [124]. For testing the correct access control, various model based approaches (e.g., [13,19,85]) haven been applied to case studies of different size. Finally, tools like Nessus [109] that rather easily allow to scan networks for applications with known vulnerabilities and, thus, applications that need to be updated or patched.…”
Section: The Third Tier: Back-end Systemsmentioning
confidence: 99%
“…Testing the security of the communication channels includes approaches that check the correct validation of SSL/TLS certificates (e.g., Frankencerts [18]) as well as protocol fuzzers such as SNOOZE [10] or SECFUZZ [124]. For testing the correct access control, various model based approaches (e.g., [13,19,85]) haven been applied to case studies of different size. Finally, tools like Nessus [109] that rather easily allow to scan networks for applications with known vulnerabilities and, thus, applications that need to be updated or patched.…”
Section: The Third Tier: Back-end Systemsmentioning
confidence: 99%
“…In literature there are few works facing coverage assessment of XACML policies. Seminal works are presented in [17] and [6]. In the former, the authors provide a first coverage criterion for XACML policies defining three structural coverage metrics targeting XACML policies, rules and conditions respectively.…”
Section: Related Workmentioning
confidence: 99%
“…This section provides a set of XACML coverage criteria useful for assessing the effectiveness of a generic XACML based testing strategy. Revising and extending the definition provided in [5], we first provide some generic definitions concerning the policy (Definitions 1 and 2) and request elements (Definition 4) and then we define the XACML coverage criteria (Definitions 5, 7, 9, 11).Definition 1 (Target Tuple): Given a Rule R , a Policy P , a PolicySet PS , with R P and P PS , and given the set of XACML elements, called XE = { xe: xe is PS or P or R }, the Target Tuple of an xe XE , called TTxe , is a 4‐tuple ( S , Res , A , E ), where S ( Res , A , E ) is a finite set of subjects (resources, actions, environments) in the XACML target of xe .…”
Section: Coverage Criteriamentioning
confidence: 99%
See 2 more Smart Citations