MUTATION TESTING OF ACCESS CONTROL POLICIES

One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user access. However, a large degree of sharing can i...

Full description

Bibliographic Details
Main Authors: Galina Cherneva, Pavlо Khalimov
Format: Article
Language:English
Published: National Technical University "Kharkiv Polytechnic Institute" 2021-02-01
Series:Сучасні інформаційні системи
Subjects:
Online Access:http://ais.khpi.edu.ua/article/view/226846/226393
id doaj-2ae5afc1e9874f5c8bfc925e133dd13c
record_format Article
spelling doaj-2ae5afc1e9874f5c8bfc925e133dd13c2021-05-18T07:10:10ZengNational Technical University "Kharkiv Polytechnic Institute"Сучасні інформаційні системи2522-90522021-02-015111812210.20998/2522-9052.2021.1.17MUTATION TESTING OF ACCESS CONTROL POLICIESGalina Cherneva0https://orcid.org/0000-0001-7441-0270Pavlо Khalimov1https://orcid.org/0000-0003-0254-5015South West University, Blagoevgrad, BulgariaNational Technical University "Kharkiv Polytechnic Institute"One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user access. However, a large degree of sharing can interfere with the protection of resources, so a sufficiently detailed AC policy should allow selective exchange of information when, in its absence, sharing can be considered too risky in general. Erroneous configurations, faulty policies, as well as flaws in the implementation of software can lead to global insecurity. Identifying the differences between policy specifications and their intended functions is crucial because the correct implementation and enforcement of the policies of a particular application is based on the premise that the specifications of this policy are correct. As a result of the policy, the specifications presented by the models must undergo rigorous validation and legalization through systematic checks and tests to ensure that the specifications of the policies really correspond to the wishes of the creators. Verifying that access control policies and models are consistent is not a trivial and critical task. And one of the important aspects of such a check is a formal check for inconsistency and incompleteness of the model, and the security requirements of the policy, because the access control model and its implementation do not necessarily express policies that can also be hidden, embedded by mixing with direct access restrictions or another access control model.http://ais.khpi.edu.ua/article/view/226846/226393access controlaccess control systemmutation testingaccess control testingpolicy
collection DOAJ
language English
format Article
sources DOAJ
author Galina Cherneva
Pavlо Khalimov
spellingShingle Galina Cherneva
Pavlо Khalimov
MUTATION TESTING OF ACCESS CONTROL POLICIES
Сучасні інформаційні системи
access control
access control system
mutation testing
access control testing
policy
author_facet Galina Cherneva
Pavlо Khalimov
author_sort Galina Cherneva
title MUTATION TESTING OF ACCESS CONTROL POLICIES
title_short MUTATION TESTING OF ACCESS CONTROL POLICIES
title_full MUTATION TESTING OF ACCESS CONTROL POLICIES
title_fullStr MUTATION TESTING OF ACCESS CONTROL POLICIES
title_full_unstemmed MUTATION TESTING OF ACCESS CONTROL POLICIES
title_sort mutation testing of access control policies
publisher National Technical University "Kharkiv Polytechnic Institute"
series Сучасні інформаційні системи
issn 2522-9052
publishDate 2021-02-01
description One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user access. However, a large degree of sharing can interfere with the protection of resources, so a sufficiently detailed AC policy should allow selective exchange of information when, in its absence, sharing can be considered too risky in general. Erroneous configurations, faulty policies, as well as flaws in the implementation of software can lead to global insecurity. Identifying the differences between policy specifications and their intended functions is crucial because the correct implementation and enforcement of the policies of a particular application is based on the premise that the specifications of this policy are correct. As a result of the policy, the specifications presented by the models must undergo rigorous validation and legalization through systematic checks and tests to ensure that the specifications of the policies really correspond to the wishes of the creators. Verifying that access control policies and models are consistent is not a trivial and critical task. And one of the important aspects of such a check is a formal check for inconsistency and incompleteness of the model, and the security requirements of the policy, because the access control model and its implementation do not necessarily express policies that can also be hidden, embedded by mixing with direct access restrictions or another access control model.
topic access control
access control system
mutation testing
access control testing
policy
url http://ais.khpi.edu.ua/article/view/226846/226393
work_keys_str_mv AT galinacherneva mutationtestingofaccesscontrolpolicies
AT pavlokhalimov mutationtestingofaccesscontrolpolicies
_version_ 1721437587756810240