Testing of PolPA-based usage control systems

被引:16
作者
Bertolino, Antonia [1 ]
Daoudagh, Said [1 ]
Lonetti, Francesca [1 ]
Marchetti, Eda [1 ]
Martinelli, Fabio [2 ]
Mori, Paolo [2 ]
机构
[1] CNR, Ist Sci & Tecnol Informaz A Faedo, I-56124 Pisa, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
关键词
Authorization systems; PolPA language; Usage control; History-based access control; Testing; Test case generation;
D O I
10.1007/s11219-013-9216-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The implementation of an authorization system is a critical and error-prone activity that requires a careful verification and testing process. As a matter of fact, errors in the authorization system code could grant accesses that should instead be denied, thus jeopardizing the security of the protected system. In this paper, we address the testing of the implementation of the Policy Decision Point (PDP) within the PolPA authorization system that enables history-based and usage-based control of accesses. Accordingly, we propose two testing strategies specifically conceived for validating the history-based access control and the usage control functionalities of the PolPA PDP. The former is based on a fault model able to highlight the problems and vulnerabilities that could occur during the PDP implementation. The latter combines the standard technique for conditions coverage with a methodology for simulating the continuous control of the PDP during the runtime execution. Both strategies are implemented within a testing framework supporting the automatic generation and execution of security test suites. Results produced by the application of this testing framework to a real case study are presented.
引用
收藏
页码:241 / 271
页数:31
相关论文
共 22 条
  • [1] Bailey C, 2012, PROC INT CONF SOFTW, P1495, DOI 10.1109/ICSE.2012.6227053
  • [2] Bertolino A., 2012, 2012 Proceedings of 7th International Workshop on Automation of Software Test (AST 2012), P8, DOI 10.1109/IWAST.2012.6228997
  • [3] Bertolino A., 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST 2012), P842, DOI 10.1109/ICST.2012.185
  • [4] Bertolino A., 2013, P 8 INT WORKSH MUT A
  • [5] Systematic XACML request generation for testing purposes
    Bertolino, Antonia
    Lonetti, Francesca
    Marchetti, Eda
    [J]. 36TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, 2010, : 3 - 11
  • [6] Bücher M, 2011, LECT NOTES COMPUT SC, V6706, P69, DOI 10.1007/978-3-642-21768-5_6
  • [7] Castrucci A, 2008, LECT NOTES COMPUT SC, V5308, P256, DOI 10.1007/978-3-540-88625-9_17
  • [8] Colombo M., 2011, INT J COMPUTER NETWO, V3, P133
  • [9] A Proposal on Enhancing XACML with Continuous Usage Control Features
    Colombo, Maurizio
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    [J]. GRIDS, P2P AND SERVICES COMPUTING, 2010, : 133 - +
  • [10] Martin E., 2006, P 17 INT S SOFTW R S