DSpace@nitr >
National Institue of Technology- Rourkela >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/853

Full metadata record

DC FieldValueLanguage
contributor.authorSharma, S-
contributor.authorJena, S K-
contributor.authorKorra, S B-
date.accessioned2009-05-20T02:24:31Z-
date.available2009-05-20T02:24:31Z-
date.issued2009-
identifier.citationIEEE International Advance Computing Conference 2009, Thapar University, Patiala, Punjab, India.en
identifier.urihttp://hdl.handle.net/2080/853-
description.abstractTo increase the confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (request) and subsequently checking test output (responses) against expected ones to enhance the correctness of specified policies. Testing of Access Control Policies along with the Application program is not a worthful practice. Unlike Software Testing we have the tools and technique for Access Control Policy Testing. Unfortunately, manual testing is tedious and time consuming job. We designed a model called ACPC (Access Control Policy Checker) which include mutation operators for comparing the original policy response with the response of mutant policy and check the correctness of the original policy. The ACPC includes two sections in first section we generate the requests set automatically which is previously not available and in second section we perform testing. This model uses the policy written in XACML (eXtensible Access Control Markup Language) [1] which is the standard language for writing Access Control Policies. We have used a tool called Margrave [8] for Change Impact Analysis and other programming languages like Java and C++ for building different module.en
format.extent194036 bytes-
format.mimetypeapplication/pdf-
language.isoen-
publisherIEEEen
subjectaccess control policiesen
subjectchange impact analysisen
subjectverificationen
subjectmutationen
subjectXACMLen
titleNew Approach for Testing the Correctness of Access Control Policiesen
typeArticleen
Appears in Collections:Conference Papers

Files in This Item:

File Description SizeFormat
suraj.pdf189KbAdobe PDFView/Open

Show simple item record

All items in DSpace are protected by copyright, with all rights reserved.

 

Powered by DSpace Feedback