Abstract
Different security policy models have been developed and published in the past. Proven security policy models, if correctly implemented, guarantee the protection of data objects from unauthorized access or usage or prevent an illegal information flow. To verify that a security policy model has been correctly implemented, it is important to define and execute an exhaustive list of test cases, which verify that the formal security policy neither has been over-constrained nor under-constrained. In this paper we present a method for defining an exhaustive list of test cases, based on formally described equivalence classes that are derived from the formal security policy description.
Original language | English |
---|---|
Pages (from-to) | 146-160 |
Number of pages | 15 |
Journal | Lecture Notes in Computer Science |
Volume | 7465 |
Issue number | 1234567890 |
DOIs | |
Publication status | Published - Aug 2012 |
Keywords
- access control
- conformance testing
- security models
- test generation