Access control policy coverage assessment through monitoring

8Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Testing access control policies relies on their execution on a security engine and the evaluation of the correct responses. Coverage measures can be adopted to know which parts of the policy are most exercised. This paper proposes an access control infrastructure for enabling the coverage criterion selection, the monitoring of the policy execution and the analysis of the policy coverage assessment. The framework is independent from the policy specification language and does not require the instrumentation of the evaluation engine. We show an instantiation of the proposed infrastructure for assessing the XACML policy testing.

Cite

CITATION STYLE

APA

Calabrò, A., Lonetti, F., & Marchetti, E. (2017). Access control policy coverage assessment through monitoring. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10489 LNCS, pp. 373–383). Springer Verlag. https://doi.org/10.1007/978-3-319-66284-8_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free