@article { author = {Safarzadeh, M. and Taghizadeh, M. and Zamani, B. and Tork Ladani, B.}, title = {An automatic test case generator for evaluating implementation of access control policies}, journal = {The ISC International Journal of Information Security}, volume = {9}, number = {1}, pages = {73-91}, year = {2017}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2017.0.0.3}, abstract = {One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more reliable. Although several researches are conducted for automated testing of the specification of access control policies at the design phase, there is not enough research on testing their implementation. In addition, since access control is amongst non-functional requirements of the system, it is not easy to test them along with other requirements of the system by usual methods. To address this challenge, in this paper, we propose an automated method for testing the implementation of access control in a system. This method, as a model based technique, is able to extract test cases for evaluating the access control policies of the system under test. To generate test cases automatically, a combination of behavior model of the system and the specification of access control policies are used. The experimental results show that the proposed approach is able to find the failures and cover most of the code that is related to access control policies.}, keywords = {Access Control Policies,Automated Testing,Model Based Technique,Implementation of Access Control,XACML}, url = {https://www.isecure-journal.com/article_43781.html}, eprint = {https://www.isecure-journal.com/article_43781_3d650b0d449e951433f398f8a6e068d9.pdf} }