KTU Repository

Testing Access Control Policy through Change Rule and Swap Rule Algorithm (CRSR)

Show simple item record

dc.contributor.author Ghann, Patricia
dc.contributor.author Ju, Shiguang
dc.contributor.author Zhou, Conghua
dc.date.accessioned 2025-02-04T12:44:11Z
dc.date.available 2025-02-04T12:44:11Z
dc.date.issued 2014-11-29
dc.identifier.uri http://ir.ktu.edu.gh/xmlui/handle/123456789/296
dc.description.abstract We propose an algorithm for generating mutant policies based on XACML Context Schema, known as Change Rule and Swap Rule Algorithm (CRSR). Compared to other testing techniques and tools for testing access control policies, where policy set or policy is evaluated first, our algorithm focuses on the rule and target of a policy set or policy. Our approach represents policy as a vector of bits. A boolean variable 1 represents the applicability of a policy to a request and a boolean variable 0 represents the non-applicability of a policy to a request. Correct policy evaluates to 1: indicating that all the elements, attributes ID and their values are correct. This is done using the XACML Context Schema for a policy and request. We identify and extract the rule and target from the policy and generate request by applying the proposed algorithm. The rule and target are evaluated first on the assumption that policy set specifies what policies may be applicable to a request, while a policy specifies the rules that are required for a policy to be applicable to a request. Mutants generated based on XACML Context Schema for policies using the proposed a en_US
dc.subject Policy testing, Original Policy, Bit Policy, Mutation testing, XACML Context Schema, Mutant Policy en_US
dc.title Testing Access Control Policy through Change Rule and Swap Rule Algorithm (CRSR) en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search KTU-IR


Advanced Search

Browse

My Account