2021
DOI: 10.20998/2522-9052.2021.1.17
|View full text |Cite
|
Sign up to set email alerts
|

Mutation Testing of Access Control Policies

Abstract: One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user access. However, a large degree of sharing can interfere with the protection of resources, so a sufficiently detailed AC policy should allow selective exchange of information when, in its absence, sharing can be considered too risky in general. Erroneous configur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
2
0
1
Order By: Relevance
“…Article [11] shows that as a result of the policy of access, specifications, the presented models must undergo rigorous verification and legalization through systematic inspections and tests to make sure that the policy specifications do meet the wishes of developers. The verification of the policy of access control and agreement of models is not a trivial and crucial task, but one of the important aspects of such verification is a formal check if the model is inconsistent and incomplete or if it meets well the requirement of security policy.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Article [11] shows that as a result of the policy of access, specifications, the presented models must undergo rigorous verification and legalization through systematic inspections and tests to make sure that the policy specifications do meet the wishes of developers. The verification of the policy of access control and agreement of models is not a trivial and crucial task, but one of the important aspects of such verification is a formal check if the model is inconsistent and incomplete or if it meets well the requirement of security policy.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Scientists explored networks in terms of their physical nature and possible impact on the protection of information [8][9][10], access to information policy [11][12][13], protection of personal information from the point of view of law [14], protection against outside electromagnetic radiation [15].…”
Section: Introductionmentioning
confidence: 99%
“…Організаційно-технічні побудови систем кібербезпеки різних країн розглядались в національних стратегіях кібербезпеки, рекомендаціях ENISA, ITU, NATО. Робіт і досліджень доволі багато [1][2][3][4][5][6][7][8][9][10][11][12][13][14], але на даний час в Україні недостатньо досліджень саме з питань розбудови ОТМ кіберзахисту (ОТМК) та з розвитку національної системи кібербезпеки в цілому. Отже головною задачею в сфері комунікаційних мереж і спеціального зв'язку стає розробка концептуальних засад формування та впровадження ОТМ кіберзахисту України.…”
Section: вступunclassified