Different security policy models have been developed and published in the past. Proven security policy models, if correctly implemented, guarantee the protection of data objects from unauthorized access or usage or prevent an illegal information flow. To verify that a security policy model has been correctly implemented, it is important to define and execute an exhaustive list of test cases, which verify that the formal security policy neither has been over-constrained nor under-constrained. In this paper we present a method for defining an exhaustive list of test cases, based on formally described equivalence classes that are derived from the formal security policy description. © 2012 IFIP International Federation for Information Processing.
CITATION STYLE
Hermann, E., Litschauer, U., & Fuß, J. (2012). A formal equivalence classes based method for security policy conformance checking. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7465 LNCS, pp. 146–160). https://doi.org/10.1007/978-3-642-32498-7_12
Mendeley helps you to discover research relevant for your work.