{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:33:07Z","timestamp":1730291587687,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/quatic.2014.17","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:53:30Z","timestamp":1419983610000},"page":"75-84","source":"Crossref","is-referenced-by-count":4,"title":["An Automated Testing Framework of Model-Driven Tools for XACML Policy Specification"],"prefix":"10.1109","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Said","family":"Daoudagh","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1390832.1390837"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"18","first-page":"278","article-title":"A generic metamodel for security policies mutation","author":"mouelhi","year":"2008","journal-title":"Software Testing Verification and Validation Workshops (ICSTW)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.27"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.44"},{"key":"14","article-title":"Automated test generation for access control policies","author":"martin","year":"2006","journal-title":"Supplemental Proc of 17th International Symposium on Software Reliability Engineering (ISSRE)"},{"journal-title":"Modellbasierte Generierung von Web-Anwendungen Mit UWE","year":"2008","author":"kroi\ufffd","key":"11"},{"key":"12","first-page":"1087","article-title":"A model-driven approach for the specification and analysis of access control policies","author":"massacci","year":"2008","journal-title":"Proc of the OTM Confederated International Conferences CoopIS DOA GADA IS and ODBASE"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07452-8_11"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.70"},{"key":"2","first-page":"155","article-title":"The X-CREATE framework-A comparison of XACML policy testing strategies","author":"bertolino","year":"2012","journal-title":"WEBIST'12"},{"journal-title":"eXtensible Access Control Markup Language (XACML) Version 2 0","year":"2005","author":"oasis","key":"1"},{"journal-title":"Secure Systems Development with UML","year":"2004","author":"j\ufffdrjens","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(96)00017-7"},{"journal-title":"Sun's XACML Implementation","year":"2006","author":"microsystems","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.185"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0101"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5721143"},{"key":"8","first-page":"426","article-title":"SecureUML: A UML-based modeling language for model-driven security","volume":"2460","author":"lodderstedt","year":"2002","journal-title":"Proc 5th Int Conf Unified Modeling Language (UML'02) Ser LNCS"}],"event":{"name":"2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)","start":{"date-parts":[[2014,9,23]]},"location":"Guimaraes, Portugal","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 9th International Conference on the Quality of Information and Communications Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979349\/6984078\/06984095.pdf?arnumber=6984095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T05:48:54Z","timestamp":1490334534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6984095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/quatic.2014.17","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}