{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T05:59:55Z","timestamp":1718085595588},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11219-013-9216-0","type":"journal-article","created":{"date-parts":[[2013,8,21]],"date-time":"2013-08-21T04:30:43Z","timestamp":1377059443000},"page":"241-271","source":"Crossref","is-referenced-by-count":16,"title":["Testing of PolPA-based usage control systems"],"prefix":"10.1007","volume":"22","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Said","family":"Daoudagh","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,22]]},"reference":[{"key":"9216_CR1","doi-asserted-by":"crossref","unstructured":"Bailey, C. (2012). Application of self-adaptive techniques to federated authorization models. In Proceedings of 34th international conference on software engineering (ICSE), (pp. 1495\u20131498).","DOI":"10.1109\/ICSE.2012.6227053"},{"key":"9216_CR2","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., & Marchetti, E. (2012). Automatic XACML requests generation for policy testing. In Proceedings of fourth IEEE international workshop on security testing (associated with ICST 2012), (pp. 842\u2013849).","DOI":"10.1109\/ICST.2012.185"},{"key":"9216_CR3","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., & Marchetti., E. (2013). XACMUT: XACML 2.0 mutants generator. In Proceedings of 8th international workshop on mutation analysis (associated with ICST 2013)","DOI":"10.1109\/ICSTW.2013.11"},{"key":"9216_CR4","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., & Marchetti, E., Martinelli, F., Mori, P. (2012). Testing of PolPA authorization systems. In Proceedings of 7th international workshop on automation of software test (associated with ICSE 2012), (pp. 8\u201314).","DOI":"10.1109\/IWAST.2012.6228997"},{"key":"9216_CR5","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Lonetti, F., & Marchetti, E. (2010). Systematic XACML request generation for testing purposes. In Proceedings of 36th EUROMICRO conference on software engineering and advanced applications (SEAA), (pp. 3\u201311).","DOI":"10.1109\/SEAA.2010.58"},{"key":"9216_CR6","doi-asserted-by":"crossref","unstructured":"B\u00fcchler, M., Oudinet, J., & Pretschner, A. (2011). Security mutants for property-based testing. In Proceedings of 5th international conference on tests and proofs (TAP), (pp. 69\u201377).","DOI":"10.1007\/978-3-642-21768-5_6"},{"key":"9216_CR7","doi-asserted-by":"crossref","unstructured":"Castrucci, A., Martinelli, F., Mori, P., & Roperti, F. (2008). Enhancing Java ME security support with resource usage monitoring. In: Proceedings of information and communications security, Lecture Notes in Computer Science, vol. 5308, pp. 256\u2013266.","DOI":"10.1007\/978-3-540-88625-9_17"},{"key":"9216_CR8","doi-asserted-by":"crossref","unstructured":"Colombo, M., Lazouski, A., Martinelli, F., & Mori, P. (2010). A proposal on enhancing XACML with continuous usage control features. In Proceedings of CoreGRID ERCIM working group workshop on grids, P2P and Services Computing, (pp. 133\u2013146). Springer","DOI":"10.1007\/978-1-4419-6794-7_11"},{"issue":"3","key":"9216_CR9","doi-asserted-by":"crossref","first-page":"133","DOI":"10.5121\/ijcnc.2011.3309","volume":"3","author":"M. Colombo","year":"2011","unstructured":"Colombo, M., Martinelli, F., Mori, P., Martini, B., Gharbaoui, M., & Castoldi, P. (2011). Extending resource access in multi-provider networks using trust management. International Journal of Computer Networks & Communications (IJCNC), 3(3), 133\u2013147.","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"issue":"5","key":"9216_CR10","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y. Jia","year":"2011","unstructured":"Jia, Y., & Harman, M. (2011) An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 37(5), 649 \u2013678.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9216_CR11","doi-asserted-by":"crossref","unstructured":"Martin, E., & Xie, T. (2006). Automated test generation for access control policies. In Supplemental Proceedings of 17th international symposium on software reliability engineering (ISSRE).","DOI":"10.1145\/1176617.1176708"},{"key":"9216_CR13","doi-asserted-by":"crossref","unstructured":"Martin, E., & Xie, T. (2007a). A fault model and mutation testing of access control policies. In Proceedings of 16th international conference on World Wide Web (WWW), (pp. 667\u2013676).","DOI":"10.1145\/1242572.1242663"},{"key":"9216_CR12","doi-asserted-by":"crossref","unstructured":"Martin, E., & Xie, T. (2007b). Automated test generation for access control policies via change-impact analysis. In Proceedings of third international workshop on software engineering for secure systems (SESS), (pp. 5\u201312).","DOI":"10.1109\/SESS.2007.5"},{"issue":"7","key":"9216_CR14","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1016\/j.future.2009.12.005","volume":"26","author":"F. Martinelli","year":"2010","unstructured":"Martinelli, F., & Mori, P. (2010). On usage control for grid systems. Future Generation Computer Systems, 26(7), 1032\u20131042.","journal-title":"Future Generation Computer Systems"},{"key":"9216_CR15","volume-title":"Foundations of software testing, 1st edn","author":"A.P. Mathur","year":"2008","unstructured":"Mathur, A.P. (2008). Foundations of software testing, 1st edn. Pearson Education, Upper Saddle River."},{"key":"9216_CR16","unstructured":"Mouelhi, T., Fleurey, F., & Baudry, B. (2008). A generic metamodel for security policies mutation. In Proceedings of software testing verification and validation workshop (ICSTW), (pp. 278\u2013286)."},{"key":"9216_CR17","doi-asserted-by":"crossref","unstructured":"Nyre, A. A. (2011). Usage control enforcement-a survey. Availability, Reliability and Security for Business, Enterprise and Health Information Systems pp. 38\u201349.","DOI":"10.1007\/978-3-642-23300-5_4"},{"key":"9216_CR18","doi-asserted-by":"crossref","unstructured":"Petrenko, A. (2001). Fault model-driven test derivation from finite state models: Annotated bibliography. In Proceedings of the 4th summer school on modeling and verification of parallel processes, (pp. 196\u2013205).","DOI":"10.1007\/3-540-45510-8_10"},{"key":"9216_CR19","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Mouelhi, T., & Le Traon, Y. (2008). Model-based tests for access control policies. In Proceedings of international conference on software testing, verification, and validation (ICST), (pp. 338\u2013347).","DOI":"10.1109\/ICST.2008.44"},{"issue":"1","key":"9216_CR20","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"R. Sandhu","year":"2004","unstructured":"Sandhu, R., & Park, J. (2004). The UCON ABC usage control model. ACM Transactions on Information and System Security, 7(1), 128\u2013174.","journal-title":"ACM Transactions on Information and System Security"},{"key":"9216_CR21","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1093\/comjnl\/bxm043","volume":"52","author":"L. Shan","year":"2007","unstructured":"Shan, L., & Zhu, H. (2007). Generating structurally complex test cases by data mutation: A case study of testing an automated modelling tool. Comp. Jour., 52, 571\u2013588.","journal-title":"Comp. Jour."},{"issue":"4","key":"9216_CR22","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., & Sandhu, R. (2005). Formal model and policy specification of usage control. ACM Transactions on Information and System Security, 8(4), 351\u2013387.","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-013-9216-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-013-9216-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-013-9216-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,21]],"date-time":"2019-07-21T10:58:14Z","timestamp":1563706694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-013-9216-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,22]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["9216"],"URL":"https:\/\/doi.org\/10.1007\/s11219-013-9216-0","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,22]]}}}