{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:58:38Z","timestamp":1769853518135,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,5,8]],"date-time":"2007-05-08T00:00:00Z","timestamp":1178582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,5,8]]},"DOI":"10.1145\/1242572.1242663","type":"proceedings-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:31Z","timestamp":1181140651000},"page":"667-676","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":94,"title":["A fault model and mutation testing of access control policies"],"prefix":"10.1145","author":[{"given":"Evan","family":"Martin","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2007,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.oasis-open.org\/committees\/xacml\/","author":"Xtensible Access Control Markup ASIS","year":"2005","unstructured":"O ASIS e Xtensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/xacml\/ , 2005 . OASIS eXtensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/xacml\/, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/sunxacml.sourceforge.net\/","author":"ACML","year":"2005","unstructured":"Sun's X ACML implementation. http:\/\/sunxacml.sourceforge.net\/ , 2005 . Sun's XACML implementation. http:\/\/sunxacml.sourceforge.net\/, 2005."},{"key":"e_1_3_2_1_3_1","unstructured":"A. T. Acree. On Mutation. PhD thesis Georgia Institute of Technology 1980.   A. T. Acree. On Mutation. PhD thesis Georgia Institute of Technology 1980."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90005-I"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646962.712108"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/186258.187179"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.142681"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/319568.319662"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152391"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101926"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80044-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.90444"},{"key":"e_1_3_2_1_21_1","first-page":"352","volume-title":"Proc. International Symposium on Software Reliability Engineering","author":"Ma Y.-S.","year":"2002","unstructured":"Y.-S. Ma , Y.-R. Kwon , and J. Offutt . Inter-class mutation operators for Java . In Proc. International Symposium on Software Reliability Engineering , pages 352 -- 363 , 2002 . Y.-S. Ma, Y.-R. Kwon, and J. Offutt. Inter-class mutation operators for Java. In Proc. International Symposium on Software Reliability Engineering, pages 352--363, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120825"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_11"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57623"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257597"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120826"},{"key":"e_1_3_2_1_31_1","first-page":"257","volume-title":"Proc. International Conference on Parallel Processing","author":"Offutt A. J.","year":"1992","unstructured":"A. J. Offutt , R. Pargas , S. V. Fichter , and P. Khambekar . Mutation testing of software using a MIMD computer . In Proc. International Conference on Parallel Processing , pages 257 -- 266 , 1992 . A. J. Offutt, R. Pargas, S. V. Fichter, and P. Khambekar. Mutation testing of software using a MIMD computer. In Proc. International Conference on Parallel Processing, pages 257--266, 1992."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.286422"},{"key":"e_1_3_2_1_33_1","first-page":"45","volume-title":"Mutation 2000: Mutation Testing in the Twentieth and the Twenty First Centuries","author":"Offutt J.","year":"2000","unstructured":"J. Offutt and R. H. Untch . Mutation 2000: Uniting the orthogonal . In Mutation 2000: Mutation Testing in the Twentieth and the Twenty First Centuries , pages 45 -- 55 , October 2000 . J. Offutt and R. H. Untch. Mutation 2000: Uniting the orthogonal. In Mutation 2000: Mutation Testing in the Twentieth and the Twenty First Centuries, pages 45--55, October 2000."},{"key":"e_1_3_2_1_34_1","first-page":"43","volume-title":"Proc. IFIP Conference on Approving Software Products","author":"Sahinoglu M.","year":"1990","unstructured":"M. Sahinoglu and E. H. Spafford . A bayes sequential statistical procedure for approving software products . In Proc. IFIP Conference on Approving Software Products , pages 43 -- 56 , 1990 . M. Sahinoglu and E. H. Spafford. A bayes sequential statistical procedure for approving software products. In Proc. IFIP Conference on Approving Software Products, pages 43--56, 1990."},{"key":"e_1_3_2_1_35_1","volume-title":"Purdue University","author":"Wong W. E.","year":"1993","unstructured":"W. E. Wong . On Mutation and Data Flow. PhD thesis , Purdue University , 1993 . W. E. Wong. On Mutation and Data Flow. PhD thesis, Purdue University, 1993."},{"key":"e_1_3_2_1_36_1","first-page":"439","volume-title":"Proc. 8th Brazilian Symposium on Software Engineering","author":"Wong W. E.","year":"1994","unstructured":"W. E. Wong , M. E. Delamaro , J. Maldonado , and A. P. Mathur . Constrained mutation in c programs . In Proc. 8th Brazilian Symposium on Software Engineering , pages 439 -- 452 , October 1994 . W. E. Wong, M. E. Delamaro, J. Maldonado, and A. P. Mathur. Constrained mutation in c programs. In Proc. 8th Brazilian Symposium on Software Engineering, pages 439--452, October 1994."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5370"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029141"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_32"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"event":{"name":"WWW'07: 16th International World Wide Web Conference","location":"Banff Alberta Canada","acronym":"WWW'07","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 16th international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1242572.1242663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1242572.1242663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:54Z","timestamp":1750258074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1242572.1242663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5,8]]},"references-count":35,"alternative-id":["10.1145\/1242572.1242663","10.1145\/1242572"],"URL":"https:\/\/doi.org\/10.1145\/1242572.1242663","relation":{},"subject":[],"published":{"date-parts":[[2007,5,8]]},"assertion":[{"value":"2007-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}