Transforming and selecting functional test cases for security policy testing - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Transforming and selecting functional test cases for security policy testing

Résumé

In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy Decision Point (PDP). The execution of functions in the business logic should thus include calls to the PDP, which grants or denies the access to the protected resources/functionalities of the system, depending on the way the PDP has been configured. The task of testing the correctness of the implementation of the security policy is tedious and costly. In this paper, we propose a new approach to reuse and automatically adapt existing functional test cases for specifically testing the security mechanisms. It includes a two step dynamic analysis technique based on mutation applied to security policies (RBAC, XACML, OrBAC). The method is applied to Java programs and provides tools for performing the two steps of the dynamic analyses. Three empirical case studies provide fruitful results and a first proof of concepts for this approach, e.g. by comparing its efficiency to an error-prone manual adaptation task.
Fichier principal
Vignette du fichier
mouelhi09.pdf (322.57 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00538390 , version 1 (22-11-2010)

Identifiants

  • HAL Id : inria-00538390 , version 1

Citer

Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry. Transforming and selecting functional test cases for security policy testing. ICST, 2009, Denver, CO, United States. ⟨inria-00538390⟩
448 Consultations
175 Téléchargements

Partager

Gmail Facebook X LinkedIn More