Works (6)

Updated: July 5th, 2023 15:49

2012 journal article

First step towards automatic correction of firewall policy faults

ACM Transactions on Autonomous and Adaptive Systems, 7(2).

By: F. Chen, A. Liu, J. Hwang & T. Xie

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Selection of regression system tests for security policy evolution

2012 proceedings of the 27th ieee/acm international conference on automated software engineering (ase), 266–269.

By: J. Hwang n, T. Xie n, D. El Kateb*, T. Mouelhi* & Y. Le Traon*

TL;DR: A regression-test-selection approach is developed, which selects every system test case that may reveal regression faults caused by policy changes, and shows that this approach reduces a substantial number of system test cases efficiently. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2011 journal article

MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 21(1), 103–127.

By: V. Hu*, D. Kuhn*, T. Xie n & J. Hwang n

author keywords: Access control; policy; model; testing
TL;DR: This paper defines a standardized structure for MAC models, providing for both property verification and automated generation of test cases, and uses the model checker to verify the integrity, coverage, and confinement of these properties for the MAC models. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Designing Fast and Scalable XACML Policy Evaluation Engines

IEEE TRANSACTIONS ON COMPUTERS, 60(12), 1802–1817.

By: A. Liu*, F. Chen*, J. Hwang n & T. Xie n

author keywords: Web servers; XACML; policy evaluation; policy-based computing; access control; policy decision point
TL;DR: This paper proposes fast policy evaluation algorithms that can be adapted to support various policy languages and focuses on XACML, which has become the de facto standard for specifying access control policies, has been widely used on web servers, and is most complex among existing policy languages. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.

By: J. Hwang n, T. Xie n & V. Hu*

author keywords: Validation; Policy Verification; Access Control Policies
TL;DR: This work develops a novel framework that analyzes policies and detects cases that potentially cause multiple-duty-related security leakage in XACML, and shows that this framework effectively pinpoints potential multiple- Duty- related security leakage for policy authors to inspect. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 article

Fault Localization for Firewall Policies

2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.

By: J. Hwang n, T. Xie n, F. Chen* & A. Liu*

TL;DR: This work proposes an approach to reduce the number of rules for inspection based on information collected during evaluating failed tests, and shows that this approach can reduce 56% of rules that are required for inspection in fault localization. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.