DocumentCode :
3155914
Title :
Transforming and Selecting Functional Test Cases for Security Policy Testing
Author :
Mouelhi, Tejeddine ; Le Traon, Yves ; Baudry, Benoit
Author_Institution :
Inst. TELECOM, Univ. Europeenne de Bretagne, Cesson-Sevigne
fYear :
2009
fDate :
1-4 April 2009
Firstpage :
171
Lastpage :
180
Abstract :
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy Decision Point (PDP). The execution of functions in the business logic should thus include calls to the PDP, which grants or denies the access to the protected resources/functionalities of the system, depending on the way the PDP has been configured. The task of testing the correctness of the implementation of the security policy is tedious and costly. In this paper, we propose a new approach to reuse and automatically transform existing functional test cases for specifically testing the security mechanisms. The method includes a three-step technique based on mutation applied to security policies (RBAC, XACML, OrBAC) and AOP for transforming automatically functional test cases into security policy test cases. The method is applied to Java programs and provides tools for performing the steps from the dynamic analyses of impacted test cases to their transformation. Three empirical case studies provide fruitful results and a first proof of concepts for this approach, e.g. by comparing its efficiency to an error-prone manual adaptation task.
Keywords :
authorisation; program diagnostics; program testing; AOP; Java programs; OrBAC; RBAC; XACML; access control logic; business logic; dynamic analysis; functional test cases; policy decision point; protected resources; security mechanism; security policies; security policy test cases; security policy testing; system functionalities; Access control; Automatic testing; Genetic mutations; Java; Logic testing; Performance evaluation; Protection; Security; Software testing; System testing; access control; mutation analysis; seurity policy testing; test transformation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Testing Verification and Validation, 2009. ICST '09. International Conference on
Conference_Location :
Denver, CO
Print_ISBN :
978-1-4244-3775-7
Electronic_ISBN :
978-0-7695-3601-9
Type :
conf
DOI :
10.1109/ICST.2009.49
Filename :
4815349
Link To Document :
بازگشت