{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:13:41Z","timestamp":1746245621357,"version":"3.40.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319074511"},{"type":"electronic","value":"9783319074528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07452-8_9","type":"book-chapter","created":{"date-parts":[[2014,5,22]],"date-time":"2014-05-22T01:53:43Z","timestamp":1400723623000},"page":"210-233","source":"Crossref","is-referenced-by-count":0,"title":["Validation of Access Control Systems"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Traon Yves","family":"Le","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]},{"given":"Tejeddine","family":"Mouelhi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., Papadakis, M.: Similarity testing for access-control. Submitted to Information and Software Technology (2013)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: XACMUT: XACML 2.0 Mutants Generator. In: Proc. of 8th International Workshop on Mutation Analysis, pp. 28\u201333 (2013)","DOI":"10.1109\/ICSTW.2013.11"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: Automatic XACML requests generation for policy testing. In: Proc. of The Third International Workshop on Security Testing, pp. 842\u2013849 (2012)","DOI":"10.1109\/ICST.2012.185"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1049\/iet-sen.2012.0101","volume":"7","author":"A. Bertolino","year":"2013","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Schilders, L.: Automated testing of extensible access control markup language-based access control systems. IET Software\u00a07(4), 203\u2013212 (2013)","journal-title":"IET Software"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Gao, J., Marchetti, E., Polini, A.: Automatic test data generation for XML schema-based partition testing. In: Proc. of Second International Workshop on Automation of Software Test (AST), pp. 4\u201310 (2007)","DOI":"10.1109\/AST.2007.6"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Lonetti, F., Marchetti, E.: Systematic XACML Request Generation for Testing Purposes. In: Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), pp. 3\u201311 (2010)","DOI":"10.1109\/SEAA.2010.58"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T.: Coverage-based test cases selection for XACML policies. In: Proc. of Fifth International Workshop on Security Testing, SECTEST (2014)","DOI":"10.1109\/ICSTW.2014.49"},{"issue":"5","key":"9_CR8","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TSE.2010.58","volume":"36","author":"H. Do","year":"2010","unstructured":"Do, H., Mirarab, S., Tahvildari, L., Rothermel, G.: The effects of time constraints on test case prioritization: A series of controlled experiments. IEEE Transactions on Software Engineering\u00a036(5), 593\u2013617 (2010)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/32.988497","volume":"28","author":"S. Elbaum","year":"2002","unstructured":"Elbaum, S., Malishevsky, A.G., Rothermel, G.: Test case prioritization: A family of empirical studies. IEEE Transactions on Software Engineering\u00a028(2), 159\u2013182 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-47919-2_9","volume-title":"Advances in Petri Nets 1986. Proceedings of an Advanced Course, Bad Honnef, 8.-19. September 1986","author":"H.J. Genrich","year":"1987","unstructured":"Genrich, H.J.: Predicate\/transition nets. In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) APN 1986. LNCS, vol.\u00a0254, pp. 207\u2013247. Springer, Heidelberg (1987)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Hemmati, H., Arcuri, A., Briand, L.: Achieving scalable model-based testing through test case diversity. ACM Trans. Softw. Eng. Methodol.\u00a022(1) (March 2013)","DOI":"10.1145\/2430536.2430540"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., Le Traon, Y.: Selection of regression system tests for security policy evolution. In: Proc. of the 27th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 266\u2013269 (2012)","DOI":"10.1145\/2351676.2351719"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y. Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering\u00a037(5), 649\u2013678 (2011)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"9_CR14","first-page":"1839","volume":"3","author":"A. Kaur","year":"2011","unstructured":"Kaur, A., Goyal, S.: A genetic algorithm for regression test case prioritization using code coverage. International Journal on Computer Science and Engineering\u00a03(5), 1839\u20131847 (2011)","journal-title":"International Journal on Computer Science and Engineering"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Leon, D., Podgurski, A.: A comparison of coverage-based and distribution-based techniques for filtering and prioritizing test cases. In: Proc. of 14th International Symposium on Software Reliability Engineering (ISSRE), pp. 442\u2013453. IEEE (2003)","DOI":"10.1109\/ISSRE.2003.1251065"},{"key":"9_CR16","unstructured":"Maly, K., Zubair, M., Nelson, M., Liu, X., Anan, H., Gao, J., Tang, J., Zhao, Y.: Archon - A digital library that federates physics collections"},{"key":"9_CR17","unstructured":"Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: Proc. of 16th International Conference on World Wide Web (WWW), pp. 667\u2013676"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Martin, E., Xie, T.: Automated Test Generation for Access Control Policies. In: Supplemental Proc. of 17th International Symposium on Software Reliability Engineering, ISSRE (November 2006)","DOI":"10.1109\/SESS.2007.5"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11935308_11","volume-title":"Information and Communications Security","author":"E. Martin","year":"2006","unstructured":"Martin, E., Xie, T., Yu, T.: Defining and measuring policy coverage in testing access control policies. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 139\u2013158. Springer, Heidelberg (2006)"},{"issue":"10","key":"9_CR20","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying\u2019design by contract\u2019. Computer\u00a025(10), 40\u201351 (1992)","journal-title":"Computer"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Mouelhi, T., Fleurey, F., Baudry, B.: A generic metamodel for security policies mutation. In: Proc. of Software Testing Verification and Validation Workshop (ICSTW), pp. 278\u2013286 (2008)","DOI":"10.1109\/ICSTW.2008.2"},{"key":"9_CR22","unstructured":"OASIS. extensible access control markup language (xacml) version 2.0 (February 1, 2005)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Mouelhi, T., Le Traon, Y.: Model-based tests for access control policies. In: Proc. of First International Conference on Software Testing, Verification (ICST), pp. 338\u2013347 (2008)","DOI":"10.1109\/ICST.2008.44"},{"key":"9_CR24","unstructured":"Realsearch Group at NCSU. iTrust: Role-Based Healthcare, http:\/\/agile.csc.ncsu.edu\/iTrust\/wiki\/doku.php"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Rothermel, G., Harrold, M.J., Ostrin, J., Hong, C.: An empirical study of the effects of minimization on the fault detection capabilities of test suites. In: Proc. of International Conference on Software Maintenance, pp. 34\u201343 (1998)","DOI":"10.1109\/ICSM.1998.738487"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Rothermel, G., Untch, R.H., Chu, C., Harrold, M.J.: Test case prioritization: An empirical study. In: Proc. of IEEE International Conference on Software Maintenance (ICSM), pp. 179\u2013188. IEEE (1999)","DOI":"10.1109\/ICSM.1999.792604"},{"issue":"10","key":"9_CR27","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/32.962562","volume":"27","author":"G. Rothermel","year":"2001","unstructured":"Rothermel, G., Untch, R.H., Chu, C., Harrold, M.J.: Prioritizing test cases for regression testing. IEEE Transactions on Software Engineering\u00a027(10), 929\u2013948 (2001)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"9_CR28","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1002\/stvr.461","volume":"22","author":"L. Tahat","year":"2012","unstructured":"Tahat, L., Korel, B., Harman, M., Ural, H.: Regression test suite prioritization using system models. Software Testing, Verification and Reliability\u00a022(7), 481\u2013506 (2012)","journal-title":"Software Testing, Verification and Reliability"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Walcott, K.R., Soffa, M.L., Kapfhammer, G.M., Roos, R.S.: Timeaware test suite prioritization. In: Proc. of the 2006 International Symposium on Software Testing and Analysis, pp. 1\u201312. ACM (2006)","DOI":"10.1145\/1146238.1146240"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Xu, D., Thomas, L., Kent, M., Mouelhi, T., Le Traon, Y.: A model-based approach to automated testing of access control policies. In: Proc. of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 209\u2013218 (2012)","DOI":"10.1145\/2295136.2295173"},{"issue":"2","key":"9_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S. Yoo","year":"2012","unstructured":"Yoo, S., Harman, M.: Regression testing minimization, selection and prioritization: A survey. Softw. Test. Verif. Reliab.\u00a022(2), 67\u2013120 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Yoo, S., Harman, M., Tonella, P., Susi, A.: Clustering test cases to achieve effective and scalable prioritisation incorporating expert knowledge. In: Proc. of the 18th International Symposium on Software Testing and Analysis, pp. 201\u2013212. ACM (2009)","DOI":"10.1145\/1572272.1572296"},{"issue":"4","key":"9_CR33","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A.V., May, J.H.R.: Software unit test coverage and adequacy. ACM Comput. Surv.\u00a029(4), 366\u2013427 (1997)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Future Internet Services and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07452-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:32:34Z","timestamp":1746232354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07452-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319074511","9783319074528"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07452-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}