On-line tracing of XACML-based policy coverage criteria

被引:3
|
作者
Lonetti, Francesca [1 ]
Marchetti, Eda [1 ]
机构
[1] CNR, Ist Sci & Tecnol Informaz A Faedo, Via G Moruzzi 1, I-56124 Pisa, Italy
关键词
authorisation; XML; program testing; eXtensible Access Control Markup Language; coverage criterion selection; on-line tracing; access control policies; XACML-based policy coverage criteria; test strategies assessment;
D O I
10.1049/iet-sen.2017.0351
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, eXtensible Access Control Markup Language (XACML) has becoming the standard for implementing access control policies and consequently more attention is dedicated to testing the correctness of XACML policies. In particular, coverage measures can be adopted for assessing test strategy effectiveness in exercising the policy elements. This study introduces a set of XACML coverage criteria and describes the access control infrastructure, based on a monitor engine, enabling the coverage criterion selection and the on-line tracing of the testing activity. Examples of infrastructure usage and of assessment of different test strategies are provided.
引用
收藏
页码:480 / 488
页数:9
相关论文
共 50 条
  • [1] An XACML-based policy management and authorization service for globus resources
    Lorch, M
    Kafura, D
    Shah, S
    [J]. FOURTH INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2003, : 208 - 210
  • [2] XACML-based policy-driven access control for mobile environments
    Qing, Xuebing
    Adams, Carlisle
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 523 - +
  • [3] XACML-Based Fine-Grained Security Policy for Distributed System
    Zhang, Ai-Juan
    Gao, Jing-Xiang
    Ji, Cheng
    [J]. ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 848 - +
  • [4] XACML-Based composition policies for ambient networks
    Kamienski, Carlos
    Fidalgo, Joseane
    Dantas, Ramide
    Sadok, Djamel
    Ohlman, Boerje
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
  • [5] Research and Application of XACML-Based Fine-Grained Security Policy for Distributed System
    Zhang Sainan
    Hong Yu
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1848 - 1851
  • [6] A XACML-based access control model for Web service
    Tao, H
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1140 - 1144
  • [7] Distributed Access Control Management - A XACML-Based Approach
    Rissanen, Erik
    Brossard, David
    Slabbert, Adriaan
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 639 - +
  • [8] XACML-Based Access Control for Decentralized Online Social Networks
    Nasim, Robayet
    Buchegger, Sonja
    [J]. 2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 671 - 676
  • [9] A Prototype for Solving Conflicts in XACML-based e-Health Policies
    Lunardelli, Alessio
    Matteucci, Ilaria
    Mori, Paolo
    Petrocchi, Marinella
    [J]. 2013 IEEE 26TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS), 2013, : 449 - 452
  • [10] Design and development of the dynamic DRBAC model using PMI and xacml-based authorization
    Fugkeaw, Somchart
    Manpanpanich, Piyawit
    Juntapremjitt, Sekpon
    [J]. Journal of Digital Information Management, 2009, 7 (02): : 63 - 73