DocumentCode
60665
Title
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets
Author
Dianxiang Xu ; Kent, Michael ; Thomas, Lijo ; Mouelhi, Tejeddine ; Le Traon, Yves
Author_Institution
Dept. of Comput. Sci., Boise State Univ., Boise, ID, USA
Volume
64
Issue
9
fYear
2015
fDate
Sept. 1 2015
Firstpage
2490
Lastpage
2505
Abstract
Role-based access control is an important access control method for securing computer systems. A role-based access control policy can be implemented incorrectly due to various reasons, such as programming errors. Defects in the implementation may lead to unauthorized access and security breaches. To reveal access control defects, this paper presents a model-based approach to automated generation of executable access control tests using predicate/transition nets. Role-permission test models are built by integrating declarative access control rules with functional test models or contracts (preconditions and postconditions) of the associated activities (the system functions). The access control tests are generated automatically from the test models to exercise the interactions of access control activities. They are transformed into executable code through a model-implementation mapping that maps the modeling elements to implementation constructs. The approach has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages. The full model-based testing process has been applied to three systems implemented in Java. The effectiveness is evaluated through mutation analysis of role-based access control rules. The experiments show that the model-based approach is highly effective in detecting the seeded access control defects.
Keywords
Java; Petri nets; authorisation; program testing; Java; automated model-based testing; declarative access control rules; functional test models; industry-adopted test automation framework; model-implementation mapping; predicate nets; role-based access control; role-permission test models; security breaches; test code generation; transition nets; unauthorized access; Access control; Analytical models; Computational modeling; Context; Inhibitors; Testing; Access controls; security and privacy protection; test design; testing tools;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2014.2375189
Filename
6967860
Link To Document