Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR)

被引:0
作者
Ghann, Patricia [1 ]
Ju, Shiguang [1 ]
Zhou, Conghua [1 ]
机构
[1] Jiangsu Univ, Dept Comp Sci, Nanjing, Jiangsu, Peoples R China
关键词
Policy testing; Original policy; Bit policy; Mutation testing; Mutant policy; XACML Context Schema;
D O I
10.1016/j.jisa.2016.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an algorithm for testing policies based on XACML Context Schema, known as Change Rule and Swap Rule Algorithm (CRSR). Compared to other testing techniques and tools for testing access control policies, where policy set or policy is evaluated first, this algorithm focuses on the rule and target of a policy set or policy. Our approach represents policy as a vector of bits. A Boolean variable 1 is used to represent the applicability of a policy to a request and a Boolean variable 0 is used to represent the non-applicability of a policy to a request. We assume that a correct policy evaluates to 1, indicating that all the elements, attributes ID and their values are correctly enforced. First of all we identify and extract the rule and target from the policy and then generate mutant policies and requests by applying the proposed algorithm. The rule and target are then evaluated using the original policies, mutant policies and requests generated. We compare our results against mutants generated using mutant operators, the Targen tool and the simple combinatorial approach to see the fault detection capability. The proposed algorithm is found to be effective, efficient and of high fault detection capability in testing access control policies, as it ensures a total coverage of the various elements of a policy based on the XACML Context Schema. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:81 / 93
页数:13
相关论文
共 16 条
  • [1] [Anonymous], 1980, Order No. 8025191
  • [2] Bertolino A., 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST 2012), P842, DOI 10.1109/ICST.2012.185
  • [3] TAXI - A tool for XML-based testing
    Bertolino, Antonia
    Gao, Jinghua
    Marchetti, Eda
    Polini, Andrea
    [J]. 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 53 - +
  • [4] Systematic XACML request generation for testing purposes
    Bertolino, Antonia
    Lonetti, Francesca
    Marchetti, Eda
    [J]. 36TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, 2010, : 3 - 11
  • [5] HIGH-PERFORMANCE MUTATION TESTING
    CHOI, BJ
    MATHUR, AP
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1993, 20 (02) : 135 - 152
  • [6] Fisler K, 2005, PROC INT CONF SOFTW, P196
  • [7] ESTIMATION AND ENHANCEMENT OF REAL-TIME SOFTWARE-RELIABILITY THROUGH MUTATION ANALYSIS
    GEIST, R
    OFFUTT, AJ
    HARRIS, FC
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1992, 41 (05) : 550 - 558
  • [8] Hughes G., 2004, AUTOMATED VERIFICATI
  • [9] APPROXIMATION ALGORITHMS FOR COMBINATORIAL PROBLEMS
    JOHNSON, DS
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1974, 9 (03) : 256 - 278
  • [10] Martin E., 2006, P ISSRE S