{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T15:14:53Z","timestamp":1726845293786},"reference-count":48,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/bs.adcom.2015.04.003","type":"book-chapter","created":{"date-parts":[[2015,6,16]],"date-time":"2015-06-16T16:53:41Z","timestamp":1434473621000},"page":"195-222","source":"Crossref","is-referenced-by-count":6,"title":["Inroads in Testing Access Control"],"prefix":"10.1016","author":[{"given":"Tejeddine","family":"Mouelhi","sequence":"first","affiliation":[]},{"given":"Donia","family":"El Kateb","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/bs.adcom.2015.04.003_bb0010","series-title":"Foundations of Security Analysis and Design: Tutorial Lectures","first-page":"137","article-title":"Access control: policies, models, and mechanisms","author":"Samarati","year":"2001"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0015","first-page":"32","article-title":"A compositional framework for access control policies enforcement","author":"Siewe","year":"2003"},{"issue":"1\u20132","key":"10.1016\/bs.adcom.2015.04.003_bb0020","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","article-title":"Edit automata: enforcement mechanisms for run-time security policies","volume":"4","author":"Ligatti","year":"2005","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0025","series-title":"Policies for Distributed Systems and Networks","first-page":"18","article-title":"The ponder policy specification language","author":"Damianou","year":"2001"},{"issue":"3","key":"10.1016\/bs.adcom.2015.04.003_bb0030","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","article-title":"Proposed NIST standard for role-based access control","volume":"4","author":"Ferraiolo","year":"2001","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0035","series-title":"Secure Computer System: Unified Exposition and Multics Interpretation (No. MTR-2997-REV-1)","author":"Bell","year":"1976"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0040","article-title":"Protection","author":"Lampson","year":"1971"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0045","first-page":"120","article-title":"Organization based access control","author":"Kalam","year":"2003"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0050","unstructured":"P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter, 2003, Enterprise privacy authorization language (EPAL 1.2), Submission to W3C, p. 1."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0055","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1151030.1151053","article-title":"Distributed usage control","volume":"49","author":"Pretschner","year":"2006","journal-title":"Commun. ACM"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0060","first-page":"57","article-title":"Towards usage control models: beyond traditional access control","author":"Park","year":"2002"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0065","series-title":"ESORICS","first-page":"98","article-title":"On obligations","author":"Hilty","year":"2005"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0070","unstructured":"X. Zhang, Formal model and analysis of usage control, Ph.D. thesis, 2006."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0075","first-page":"92","article-title":"Ensuring integrity by adding obligations to privileges","author":"Minsky","year":"1985"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0080","first-page":"134","article-title":"On the modeling and analysis of obligations","author":"Irwin","year":"2006"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0085","first-page":"57","article-title":"Towards usage control models: beyond traditional access control","author":"Park","year":"2002"},{"issue":"1","key":"10.1016\/bs.adcom.2015.04.003_bb0090","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/984334.984339","article-title":"The UCON ABC usage control model","volume":"7","author":"Park","year":"2004","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0095","series-title":"Cloud Computing","first-page":"559","article-title":"Access control of cloud service based on ucon","author":"Danwei","year":"2009"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0100","first-page":"75","article-title":"Testing and analysis of access control policies","author":"Martin","year":"2007"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0105","first-page":"171","article-title":"Transforming and selecting functional test cases for security policy testing","author":"Mouelhi","year":"2009"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0110","series-title":"MODELSWARD","article-title":"A toolchain for model-based design and testing of access control systems","author":"Daoudagh","year":"2015"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0115","series-title":"Encyclopedia of Software Engineering","first-page":"673","article-title":"Testing access control policies","author":"Hwang","year":"2010"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0120","first-page":"667","article-title":"A fault model and mutation testing of access control policies","author":"Martin","year":"2007"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0125","first-page":"233","article-title":"Mutation analysis for security tests qualification","author":"Mouelhi","year":"2007"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0130","first-page":"28","article-title":"Xacmut: Xacml 2.0 mutants generator","author":"Bertolino","year":"2013"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0135","series-title":"WEBIST","first-page":"155","article-title":"The X-CREATE framework\u2014a comparison of XACML policy testing strategies","author":"Bertolino","year":"2012"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0140","first-page":"308","article-title":"Model driven architecture","volume":"308","author":"Soley","year":"2000","journal-title":"OMG White Paper"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0145","first-page":"296","article-title":"Model based testing","author":"Apfelbaum","year":"1997"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0150","first-page":"338","article-title":"Model-based tests for access control policies","author":"Pretschner","year":"2008"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0155","series-title":"Model Driven Engineering Languages and Systems","first-page":"537","article-title":"A model-based framework for security policy specification, deployment and testing","author":"Mouelhi","year":"2008"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0160","series-title":"Aspect-oriented programming","first-page":"220","author":"Kiczales","year":"1997"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0165","first-page":"209","article-title":"A model-based approach to automated testing of access control policies","author":"Xu","year":"2012"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0170","series-title":"Reliable Distributed Systems, 2008, SRDS\u201908. IEEE Symposium on","first-page":"105","article-title":"Systematic structural testing of firewall policies","author":"Hwang","year":"2008"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0175","series-title":"Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications","first-page":"752","article-title":"Automated test generation for access control policies","author":"Martin","year":"2006"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0180","first-page":"5","article-title":"Automated test generation for access control policies via change-impact analysis","author":"Martin","year":"2007"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0185","first-page":"8","article-title":"Testing of PolPA authorization systems","author":"Bertolino","year":"2012"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0190","series-title":"WEBIST","first-page":"155","article-title":"The X-CREATE framework\u2014a comparison of XACML policy testing strategies","author":"Bertolino","year":"2012"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0195","series-title":"High Assurance Systems Engineering Symposium, 2007, HASE\u201907, 10th IEEE","first-page":"149","article-title":"Testing security rules with decomposable activities","author":"Mallouli","year":"2007"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0200","first-page":"127","article-title":"A formal approach for testing security rules","author":"Mallouli","year":"2007"},{"issue":"5","key":"10.1016\/bs.adcom.2015.04.003_bb0205","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2009.35","article-title":"Scalable and effective test generation for role-based access control systems","volume":"35","author":"Masood","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0210","first-page":"133","article-title":"An approach to modular and testable security models of real-world health-care applications","author":"Brucker","year":"2011"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0215","first-page":"12","article-title":"Coverage-based test cases selection for XACML policies","author":"Bertolino","year":"2014"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0220","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.infsof.2014.07.003","article-title":"Similarity testing for access control","volume":"58","author":"Bertolino","year":"2015","journal-title":"Inf. Softw. Technol."},{"issue":"8","key":"10.1016\/bs.adcom.2015.04.003_bb0225","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/32.536955","article-title":"Analyzing regression test selection techniques","volume":"22","author":"Rothermel","year":"1996","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.04.003_bb0230","first-page":"266","article-title":"Selection of regression system tests for security policy evolution","author":"Hwang","year":"2012"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0235","first-page":"1","article-title":"Model-based testing of obligations","author":"Rubab","year":"2014"},{"key":"10.1016\/bs.adcom.2015.04.003_bb0240","first-page":"673","article-title":"Testing obligation policy enforcement using mutation analysis","author":"Elrakaiby","year":"2012"},{"issue":"6","key":"10.1016\/bs.adcom.2015.04.003_bb0245","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MSP.2010.194","article-title":"Toward a multi-tenancy authorization system for cloud services","volume":"8","author":"Calero","year":"2010","journal-title":"IEEE Secur. Priv."}],"container-title":["Advances in Computers"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000327?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000327?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T19:21:33Z","timestamp":1537557693000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245815000327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1016\/bs.adcom.2015.04.003","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]}}}