{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:43:04Z","timestamp":1725619384566},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/iwast.2013.6595793","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:56:19Z","timestamp":1379591779000},"page":"64-70","source":"Crossref","is-referenced-by-count":2,"title":["Access control enforcement testing"],"prefix":"10.1109","author":[{"given":"Donia","family":"El Kateb","sequence":"first","affiliation":[]},{"given":"Yehia","family":"El Rakaiby","sequence":"additional","affiliation":[]},{"given":"Tejeddine","family":"Mouelhi","sequence":"additional","affiliation":[]},{"given":"Yves Le","family":"Traon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2003.10.007"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.21"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.49"},{"key":"13","first-page":"278","article-title":"A generic metamodel for security policies mutation","author":"mouelhi","year":"2008","journal-title":"ICST Workshops"},{"key":"14","first-page":"537","article-title":"A model-based framework for security policy specification, deployment and testing","author":"mouelhi","year":"2008","journal-title":"MoDELS"},{"key":"11","first-page":"303","article-title":"The inevitability of failure: The flawed assumption of security in modern computing environments","author":"loscocco","year":"1998","journal-title":"Proceedings of the 21st National Information Systems Security Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.400"},{"key":"3","first-page":"15","author":"aksit","year":"2004","journal-title":"Principles of Aspect-oriented Programming Languages Design Dimensions and the Composition Filters Approach"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.60"},{"journal-title":"Proposed NIST Standard for Role-based Access Control","year":"2001","author":"ferraiolo","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.157"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"},{"journal-title":"Secure Computer Systems Unified Exposition and Multics Interpretation","year":"1975","author":"bell","key":"4"},{"key":"9","first-page":"327","author":"kiczales","year":"2001","journal-title":"An Overview of AspectJ"},{"key":"8","article-title":"Organization based access control","author":"kalam","year":"2003","journal-title":"Policy"}],"event":{"name":"2013 8th International Workshop on Automation of Software Test (AST)","start":{"date-parts":[[2013,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 8th International Workshop on Automation of Software Test (AST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588690\/6595779\/06595793.pdf?arnumber=6595793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:37:26Z","timestamp":1490204246000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6595793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iwast.2013.6595793","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}