Model-based tests for access control policies 1

Alexander Pretschner, Tejeddine Mouelhi, Yves Le Traon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

70 Scopus citations

Abstract

We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies - i.e., the model - and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants than the same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points.

Original languageEnglish
Title of host publicationProceedings of the 1st International Conference on Software Testing, Verification and Validation, ICST 2008
Pages338-347
Number of pages10
DOIs
StatePublished - 2008
Externally publishedYes
Event1st International Conference on Software Testing, Verification and Validation, ICST 2008 - Lillehammer, Norway
Duration: 9 Apr 200811 Apr 2008

Publication series

NameProceedings of the 1st International Conference on Software Testing, Verification and Validation, ICST 2008

Conference

Conference1st International Conference on Software Testing, Verification and Validation, ICST 2008
Country/TerritoryNorway
CityLillehammer
Period9/04/0811/04/08

Fingerprint

Dive into the research topics of 'Model-based tests for access control policies 1'. Together they form a unique fingerprint.

Cite this