A Formal Approach for Testing Security Rules

被引:0
|
作者
Mallouli, Wissam [1 ]
Orset, Jean-Marie [1 ]
Cavalli, Ana [1 ]
Cuppens, Nora
Cuppens, Frederic
机构
[1] GET INT Evry, SAMOVAR, F-91011 Evry, France
关键词
Security Policy; OrBAC; EFSM; Verification and Testing; Test Generation; SDL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we propose a framework to specify security policies and test their implementation on a system. Our framework makes it possible to generate in an automatic manner, test sequences, in order to validate the conformance of a security policy, system behavior is specified using a formal description technique based on extended finite state machine (EFSM) [12]. The integration of security rules within the system specification is performed by specific algorithms. Then, the automatic tests generation is performed using a dedicated tool, called SIRIUS, developed in our laboratory. Finally, we briefly present a weblog system as a case study to demonstrate the reliability of our framework.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] A Formal Approach to Automatic Testing of Security Policies Specified in XACML
    Aouadi, Mohamed H. E.
    Toumi, Khalifa
    Cavalli, Ana
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
  • [2] A FORMAL APPROACH TO SECURITY ARCHITECTURES
    RUEPPEL, RA
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 385 - 398
  • [3] Testing security rules with decomposable activities
    Mallouli, Wissam
    Cavalli, Ana
    [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 149 - 155
  • [4] A FORMAL APPROACH TO CONFORMANCE TESTING
    TRETMANS, J
    [J]. PROTOCOL TEST SYSTEMS, VI, 1994, 19 : 257 - 276
  • [5] Security Policy Alignment: A Formal Approach
    Pieters, Wolter
    Dimkov, Trajce
    Pavlovic, Dusko
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 275 - 287
  • [6] A Formal Approach to Information Security Metrics
    Chakraborty, Agniswar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, : 439 - 442
  • [7] Rules Transformation Using Formal Concept Approach
    Jurkevicius, Darius
    Vasilecas, Olegas
    [J]. INFORMATION SYSTEMS DEVELOPMENT: TOWARDS A SERVICE PROVISION SOCIETY, 2009, : 511 - 518
  • [8] A Security Assurance Framework Combining Formal Verification and Security Functional Testing
    Wang, Weiguang
    Zeng, Qingkai
    Mathur, Aditya P.
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2012, : 136 - 139
  • [9] A formal approach to protocol interoperability testing
    Ruibing Hao
    Jianping Wu
    [J]. Journal of Computer Science and Technology, 1998, 13 (1) : 79 - 90
  • [10] A Formal Approach to Testing Programs in Practice
    Liu, Shaoying
    Shen, Wuwei
    Nakajima, Shin
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, 9 (04) : 1469 - 1491