{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:06:21Z","timestamp":1744193181231},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540878742"},{"type":"electronic","value":"9783540878759"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87875-9_38","type":"book-chapter","created":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T01:46:10Z","timestamp":1222047970000},"page":"537-552","source":"Crossref","is-referenced-by-count":57,"title":["A Model-Based Framework for Security Policy Specification, Deployment and Testing"],"prefix":"10.1007","author":[{"given":"Tejeddine","family":"Mouelhi","sequence":"first","affiliation":[]},{"given":"Franck","family":"Fleurey","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Le Traon, Y., Mouelhi, T., Pretschner, A., Baudry, B.: Test-Driven Assessment of Access Control in Legacy Applications. In: ICST 2008: First IEEE International Conference on Software, Testing, Verification and Validation (2008)","DOI":"10.1109\/ICST.2008.60"},{"issue":"3","key":"38_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"38_CR3","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"issue":"4","key":"38_CR4","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R. DeMillo","year":"1978","unstructured":"DeMillo, R., Lipton, R., Sayward, F.: Hints on Test Data Selection: Help For The Practicing Programmer. IEEE Computer\u00a011(4), 34\u201341 (1978)","journal-title":"IEEE Computer"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Martin, E., Xie, T.: A Fault Model and Mutation Testing of Access Control Policies. In: Proceedings of the 16th International Conference on World Wide Web (2007)","DOI":"10.1145\/1242572.1242663"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Mouelhi, T., Le Traon, Y., Baudry, B.: Mutation analysis for security tests qualification. In: Mutation 2007: third workshop on mutation analysis in conjuction with TAIC-Part (2007)","DOI":"10.1109\/TAIC.PART.2007.21"},{"key":"38_CR7","unstructured":"Sun\u2019s XACML implementation, http:\/\/sunxacml.sourceforge.net\/"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Le Traon, Y., Mouelhi, T., Baudry, B.: Testing security policies: going beyond functional testing. In: ISSRE 2007: The 18th IEEE International Symposium on Software Reliability Engineering (2007)","DOI":"10.1109\/ISSRE.2007.27"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Proceedings of the 5th International Conference on The Unified Modeling Language (2002)","DOI":"10.1007\/3-540-45800-X_32"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Proceedings of the 5th International Conference on The Unified Modeling Language (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"key":"38_CR11","unstructured":"Masood, A., Ghafoor, A., Mathur, A.: Scalable and Effective Test Generation for Access Control Systems that Employ RBAC Policies (2006)"}],"container-title":["Lecture Notes in Computer Science","Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87875-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T04:14:56Z","timestamp":1557807296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87875-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540878742","9783540878759"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87875-9_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}