Transforming and selecting functional test cases for security policy testingReport as inadecuate




Transforming and selecting functional test cases for security policy testing - Download this document for free, or read online. Document in PDF available to download.

1 TRISKELL - Reliable and efficient component based software engineering IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique 2 Telecom Bretagne - Rennes 3 RSM - Département Réseaux, Sécurité et Multimédia

Abstract : In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy Decision Point PDP. The execution of functions in the business logic should thus include calls to the PDP, which grants or denies the access to the protected resources-functionalities of the system, depending on the way the PDP has been configured. The task of testing the correctness of the implementation of the security policy is tedious and costly. In this paper, we propose a new approach to reuse and automatically adapt existing functional test cases for specifically testing the security mechanisms. It includes a two step dynamic analysis technique based on mutation applied to security policies RBAC, XACML, OrBAC. The method is applied to Java programs and provides tools for performing the two steps of the dynamic analyses. Three empirical case studies provide fruitful results and a first proof of concepts for this approach, e.g. by comparing its efficiency to an error-prone manual adaptation task.





Author: Tejeddine Mouelhi - Yves Le Traon - Benoit Baudry -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents