Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1558607.1558623acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Security policy testing via automated program code generation

Published: 13 April 2009 Publication History

Abstract

Access control is one of the fundamental security mechanisms for information systems. It determines the availability of resources to principals, operations that can be performed, and under what circumstances. Traditionally the enforcement of access control is often hardcoded in applications or systems; such hardcoding makes it hard to verify the correctness of access control and to accommodate changes of security requirements. Recently, access control policies have been increasingly separated from enforcement mechanisms. An access control policy is explicitly specified using certain policy languages with well-defined syntax and semantics. An application then consults the policy during runtime to determine whether an access request from a principal should be allowed or denied. There are two main advantages of this approach. First, security officers can now perform systematic and formal security analysis on access control policies. Second, by separating policies from enforcement mechanisms, it is possible to change policies without affecting the underlying mechanisms, and vice versa.

References

[1]
]]Sun's XACML implementation. http://sunxacml.sourceforge.net/, 2005.
[2]
]]Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Morris Sloman. The Ponder policy specification language. In Proc. POLICY, pages 18--38, 2001.
[3]
]]Richard A. DeMillo, Richard J. Lipton, and Frederick G. Sayward. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34--41, April 1978.
[4]
]]Evan Martin and Tao Xie. Automated test generation for access control policies. In Supplemental Proc. ISSRE, 2006.
[5]
]]Evan Martin and Tao Xie. A fault model and mutation testing of access control policies. In Proc. WWW, pages 667--676, 2007.
[6]
]]Evan Martin, Tao Xie, and Ting Yu. Defining and measuring policy coverage in testing access control policies. In Proc. ICICS, pages 139--158, 2006.
[7]
]]Koushik Sen and Gul Agha. CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools. In Proc. CAV, pages 419--423, 2006.
[8]
]]OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.

Cited By

View all
  • (2017)Research of a Data Flow Test Method for Attribute-Based Access Control Systems2017 International Conference on Network and Information Systems for Computers (ICNISC)10.1109/ICNISC.2017.00043(167-171)Online publication date: Apr-2017
  • (2017)A new testing method for XACML 3.0 policy based on ABAC and data flow2017 13th IEEE International Conference on Control & Automation (ICCA)10.1109/ICCA.2017.8003052(160-164)Online publication date: Jul-2017
  • (2015)Gamifying software security education and training via secure coding duels in code huntProceedings of the 2015 Symposium and Bootcamp on the Science of Security10.1145/2746194.2746220(1-2)Online publication date: 21-Apr-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
April 2009
952 pages
ISBN:9781605585185
DOI:10.1145/1558607
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '09

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)2
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Research of a Data Flow Test Method for Attribute-Based Access Control Systems2017 International Conference on Network and Information Systems for Computers (ICNISC)10.1109/ICNISC.2017.00043(167-171)Online publication date: Apr-2017
  • (2017)A new testing method for XACML 3.0 policy based on ABAC and data flow2017 13th IEEE International Conference on Control & Automation (ICCA)10.1109/ICCA.2017.8003052(160-164)Online publication date: Jul-2017
  • (2015)Gamifying software security education and training via secure coding duels in code huntProceedings of the 2015 Symposium and Bootcamp on the Science of Security10.1145/2746194.2746220(1-2)Online publication date: 21-Apr-2015
  • (2013)Securely handling application-to-application connection credentials2013 Proceedings of IEEE Southeastcon10.1109/SECON.2013.6567464(1-7)Online publication date: Apr-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media