{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:43:12Z","timestamp":1732034592514},"reference-count":21,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET softw."],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1049\/iet-sen.2012.0101","type":"journal-article","created":{"date-parts":[[2013,7,15]],"date-time":"2013-07-15T20:02:09Z","timestamp":1373918529000},"page":"203-212","source":"Crossref","is-referenced-by-count":20,"title":["Automated testing of eXtensible Access Control Markup Language\u2010based access control systems"],"prefix":"10.1049","volume":"7","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[{"name":"Istituto di Scienza e Tecnologie dell'Informazione \u2018A. Faedo\u2019 CNR via G. Moruzzi 1 56124 Pisa Italy"}]},{"given":"Said","family":"Daoudagh","sequence":"additional","affiliation":[{"name":"Istituto di Scienza e Tecnologie dell'Informazione \u2018A. Faedo\u2019 CNR via G. Moruzzi 1 56124 Pisa Italy"}]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[{"name":"Istituto di Scienza e Tecnologie dell'Informazione \u2018A. Faedo\u2019 CNR via G. Moruzzi 1 56124 Pisa Italy"}]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[{"name":"Istituto di Scienza e Tecnologie dell'Informazione \u2018A. Faedo\u2019 CNR via G. Moruzzi 1 56124 Pisa Italy"}]},{"given":"Louis","family":"Schilders","sequence":"additional","affiliation":[{"name":"CEO Custodix NV 9830 Sint-Martens-Latem Belgium"}]}],"member":"265","published-online":{"date-parts":[[2013,8]]},"reference":[{"key":"e_1_2_11_2_1","unstructured":"TAS3\u00a0Project. Trusted Architecture for Securely Shared Services.http:\/\/www.tas3.eu\/"},{"key":"e_1_2_11_3_1","unstructured":"OASIS: \u2018eXtensible Access Control Markup Language (XACML)Version 2.0 February 2005.https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml#XACML20"},{"key":"e_1_2_11_4_1","doi-asserted-by":"crossref","unstructured":"Bertolino A. Lonetti F. Marchetti E.: \u2018Systematic XACML request generation for testing purposes\u2019.Proc. SEAA September2010 pp.3\u201311","DOI":"10.1109\/SEAA.2010.58"},{"key":"e_1_2_11_5_1","doi-asserted-by":"crossref","unstructured":"Bertolino A. Daoudagh S. Lonetti F. Marchetti E.: \u2018Automatic XACML requests generation for policy testing\u2019.Proc. ICST April2012 pp.842\u2013849","DOI":"10.1109\/ICST.2012.185"},{"key":"e_1_2_11_6_1","unstructured":"Bertolino A. Daoudagh S. Lonetti F. Marchetti E.: \u2018The X-CREATE framework: a comparison of XACML policy testing strategies\u2019.Proc. WEBIST April2012 pp.155\u2013160"},{"key":"e_1_2_11_7_1","unstructured":"Custodix.https:\/\/www.custodix.com\/"},{"key":"e_1_2_11_8_1","doi-asserted-by":"crossref","unstructured":"Bertolino A. Gao J. Marchetti E. Polini A.: \u2018Automatic test data generation for XML schema-based partition testing\u2019.Proc. AST May2007 pp.10\u201316","DOI":"10.1109\/AST.2007.6"},{"key":"e_1_2_11_9_1","doi-asserted-by":"crossref","unstructured":"Martin E.: \u2018Automated test generation for access control policies\u2019.Proc. OOPSLA October2006 pp.752\u2013753","DOI":"10.1145\/1176617.1176708"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.605761"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62964"},{"key":"e_1_2_11_12_1","unstructured":"FedoraCommons. Fedora Commons Repository Software.http:\/\/www.fedora-commons.org\/"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"Martin E. Xie T.: \u2018A fault model and mutation testing of access control policies\u2019.Proc. WWW May2007 pp.667\u2013676","DOI":"10.1145\/1242572.1242663"},{"key":"e_1_2_11_15_1","doi-asserted-by":"crossref","unstructured":"Martin E. Xie T.: \u2018Automated test generation for access control policies via change-impact analysis\u2019.Proc. SESS May2007 pp.5\u201312","DOI":"10.1109\/SESS.2007.5"},{"key":"e_1_2_11_16_1","doi-asserted-by":"crossref","unstructured":"Fisler K. Krishnamurthi S. Meyerovich L.A. Tschantz M.C.: \u2018Verification and change-impact analysis of access-control policies\u2019.Proc. ICSE May2005 pp.196\u2013205","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_2_11_17_1","doi-asserted-by":"crossref","unstructured":"Li N. Hwang J. Xie T.: \u2018Multiple-implementation testing for XACML implementations\u2019.Proc. TAV-WEB July2008 pp.27\u201333","DOI":"10.1145\/1390832.1390837"},{"key":"e_1_2_11_18_1","doi-asserted-by":"crossref","unstructured":"Bertolino A. Daoudagh S. Lonetti F. Marchetti E. Martinelli F. Mori P.: \u2018Testing of PolPA authorization systems\u2019.Proc. AST June2012 pp.8\u201314","DOI":"10.1109\/IWAST.2012.6228997"},{"key":"e_1_2_11_19_1","doi-asserted-by":"crossref","unstructured":"Le Traon Y. Mouelhi T. Baudry B.: \u2018Testing security policies: going beyond functional testing\u2019.Proc. ISSRE November2007 pp.93\u2013102","DOI":"10.1109\/ISSRE.2007.27"},{"key":"e_1_2_11_20_1","doi-asserted-by":"crossref","unstructured":"Mallouli W. Orset J.-M. Cavalli A. Cuppens N. Cuppens F.: \u2018A formal approach for testing security rules\u2019.Proc. SACMAT June2007 pp.127\u2013132","DOI":"10.1145\/1266840.1266860"},{"key":"e_1_2_11_21_1","doi-asserted-by":"crossref","unstructured":"Li K. Mounier L. Groz R.: \u2018Test generation from security policies specified in or-BAC\u2019.Proc. COMPSAC July2007 pp.255\u2013260","DOI":"10.1109\/COMPSAC.2007.210"},{"key":"e_1_2_11_22_1","doi-asserted-by":"crossref","unstructured":"Pretschner A. Mouelhi T. Le Traon Y.: \u2018Model-based tests for access control policies\u2019.Proc. ICST April2008 pp.338\u2013347","DOI":"10.1109\/ICST.2008.44"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2012.0101","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-sen.2012.0101","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2012.0101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T13:47:28Z","timestamp":1612619248000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-sen.2012.0101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["10.1049\/iet-sen.2012.0101"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2012.0101","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8]]}}}