Title :
Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies
Author :
Le Traon, Yves ; Mouelhi, Tejeddine ; Fleurey, Franck ; Baudry, Benoit
Author_Institution :
Univ. of Luxembourg, Luxembourg, Luxembourg
Abstract :
In this paper, we study an issue related to the abstraction level of a meta-model through the example of a model-driven approach for specifying, deploying and testing security policies in Java applications. The issue we focus on is the balance between a "generic" meta-model and the semantics we want to attach to it, which ahs to be precise enough. The goal of the original work was to present a full MDE process to check the consistency of a security policy and generate qualification criteria for the test cases testing the security mechanisms in the final code. The most original idea is that security policy is specified independently of the underlying access control language (OrBAC, RBAC, DAC or MAC). It is based on a generic security meta-model which can be used for early consistency checks in the security policy. We qualify the test cases that validate the security policy in the application with a fault injection technique, mutation applied to access control policies. In the empirical results on 3 case studies, we explore the advantages and limitations of the mutation operators and verification checks whose semantics is defined on the meta-model. The overall question we address is not the feasibility of the approach as shown in our previous work but the quality of a metamodel for test and verification purpose.
Keywords :
Java; authorisation; formal verification; program testing; programming language semantics; Java applications; access control language; access control policy testing; access control policy verifying; embedding semantics; language-independent approach; language-specific approach; security policies; Access control; Automated highways; Genetic mutations; Heart; Java; Model driven engineering; Qualifications; Security; Software testing;
Conference_Titel :
Software Testing, Verification, and Validation Workshops (ICSTW), 2010 Third International Conference on
Conference_Location :
Paris
Print_ISBN :
978-1-4244-6773-0
DOI :
10.1109/ICSTW.2010.67