首页> 外文期刊>Computers, IEEE Transactions on >Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets
【24h】

Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets

机译:使用谓词/过渡网的基于角色的访问控制的基于模型的自动化测试

获取原文
获取原文并翻译 | 示例
       

摘要

Role-based access control is an important access control method for securing computer systems. A role-based access control policy can be implemented incorrectly due to various reasons, such as programming errors. Defects in the implementation may lead to unauthorized access and security breaches. To reveal access control defects, this paper presents a model-based approach to automated generation of executable access control tests using predicate/transition nets. Role-permission test models are built by integrating declarative access control rules with functional test models or contracts (preconditions and postconditions) of the associated activities (the system functions). The access control tests are generated automatically from the test models to exercise the interactions of access control activities. They are transformed into executable code through a model-implementation mapping that maps the modeling elements to implementation constructs. The approach has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages. The full model-based testing process has been applied to three systems implemented in Java. The effectiveness is evaluated through mutation analysis of role-based access control rules. The experiments show that the model-based approach is highly effective in detecting the seeded access control defects.
机译:基于角色的访问控制是保护计算机系统安全的重要访问控制方法。由于各种原因(例如编程错误),可能无法正确实施基于角色的访问控制策略。实施中的缺陷可能会导致未经授权的访问和安全漏洞。为了揭示访问控制缺陷,本文提出了一种基于模型的方法,该方法使用谓词/转换网络自动生成可执行的访问控制测试。角色权限测试模型是通过将声明性访问控制规则与功能测试模型或关联活动(系统功能)的合同(前提条件和后置条件)集成而构建的。访问控制测试是根据测试模型自动生成的,用于执行访问控制活动的交互。它们通过模型实现映射转换为可执行代码,该映射将建模元素映射到实现构造。该方法已在行业采用的测试自动化框架中实施,该框架支持以多种语言生成测试代码。完整的基于模型的测试过程已应用于Java中实现的三个系统。通过基于角色的访问控制规则的变异分析来评估有效性。实验表明,基于模型的方法在检测种子访问控制缺陷方面非常有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号