{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:11Z","timestamp":1750308611596,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T00:00:00Z","timestamp":1527465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,28]]},"DOI":"10.1145\/3194733.3194743","type":"proceedings-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T12:22:47Z","timestamp":1530102167000},"page":"2-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An automated model-based test oracle for access control systems"],"prefix":"10.1145","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Said","family":"Daoudagh","sequence":"additional","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[{"name":"University of Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The oracle problem in software testing: A survey","author":"Barr Earl T","year":"2015","unstructured":"Earl T Barr , Mark Harman , Phil McMinn , Muzammil Shahbaz , and Shin Yoo . 2015. The oracle problem in software testing: A survey . IEEE transactions on software engineering 41, 5 ( 2015 ), 507--525. Earl T Barr, Mark Harman, Phil McMinn, Muzammil Shahbaz, and Shin Yoo. 2015. The oracle problem in software testing: A survey. IEEE transactions on software engineering 41, 5 (2015), 507--525."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9216-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0101"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66284-8_31"},{"volume-title":"A Data Warehouse and a Framework for the Validation and Testing of Access Control Systems. Master's thesis","author":"Daoudagh Said","key":"e_1_3_2_1_5_1","unstructured":"Said Daoudagh . 2017. A Data Warehouse and a Framework for the Validation and Testing of Access Control Systems. Master's thesis . University of Pisa , Italy. Said Daoudagh. 2017. A Data Warehouse and a Framework for the Validation and Testing of Access Control Systems. Master's thesis. University of Pisa, Italy."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005330604110418"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_8_1","volume-title":"Hu","author":"Hwang JeeHyun","year":"2011","unstructured":"JeeHyun Hwang , Evan Martin , Tao Xie , and Vincent C . Hu . 2011 . Policy-Based Testing. In Encyclopedia of Software Engineering. Taylor & Francis , 673--683. JeeHyun Hwang, Evan Martin, Tao Xie, and Vincent C. Hu. 2011. Policy-Based Testing. In Encyclopedia of Software Engineering. Taylor & Francis, 673--683."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.22"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of MILCOM. 366--371","author":"Li Ang","year":"2015","unstructured":"Ang Li , Qinghua Li , Vincent C Hu , and Jia Di . 2015 . Evaluating the capability and performance of access control policy verification tools . In Proc. of MILCOM. 366--371 . Ang Li, Qinghua Li, Vincent C Hu, and Jia Di. 2015. Evaluating the capability and performance of access control policy verification tools. In Proc. of MILCOM. 366--371."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390832.1390837"},{"key":"e_1_3_2_1_12_1","volume-title":"Automated Test Generation for Access Control Policies. In Supplemental Proc. of ISSRE.","author":"Martin Evan","year":"2006","unstructured":"Evan Martin and Tao Xie . 2006 . Automated Test Generation for Access Control Policies. In Supplemental Proc. of ISSRE. Evan Martin and Tao Xie. 2006. Automated Test Generation for Access Control Policies. In Supplemental Proc. of ISSRE."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242663"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_11"},{"key":"e_1_3_2_1_15_1","unstructured":"OASIS. 2005. eXtensible Access Control Markup Language (XACML) Version 2.0. http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf. (February 2005).  OASIS. 2005. eXtensible Access Control Markup Language (XACML) Version 2.0. http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf. (February 2005)."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.oasis-open.org\/committees\/document.php?document_id=14846. (February","author":"Conformance OASIS.","year":"2005","unstructured":"OASIS. 2005. XACML 2.0 Conformance Tests v0.4. https:\/\/www.oasis-open.org\/committees\/document.php?document_id=14846. (February 2005 ). OASIS. 2005. XACML 2.0 Conformance Tests v0.4. https:\/\/www.oasis-open.org\/committees\/document.php?document_id=14846. (February 2005)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295153"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.44"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375189"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2014.21"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_32"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 13th International Workshop on Automation of Software Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194733.3194743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194733.3194743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:23Z","timestamp":1750273643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194733.3194743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,28]]},"references-count":22,"alternative-id":["10.1145\/3194733.3194743","10.1145\/3194733"],"URL":"https:\/\/doi.org\/10.1145\/3194733.3194743","relation":{},"subject":[],"published":{"date-parts":[[2018,5,28]]},"assertion":[{"value":"2018-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}