[1] Bell M. SOA Modeling Patterns for Service-Oriented Discovery and Analysis[M]. New Jersey: John Wiley & Sons, 2010: 390.
[2] Alzahrani A, Janicke H, Abubaker S. Decentralized XACML Overlay Network[C]//The 10th IEEE International Conference on Computer and Information Technology. Piscataway: IEEE, 2010: 1032-1037.
[3] Liu A, Chen F, Hwang J, et al. Designing Fast and Scalable XACML Policy Evaluation Engines[J]. IEEE Transactions on Computers, 2011, 60(12): 1802-1817.
[4] Marouf S, Shehab M, Squicciarini A, et al. Adaptive Reordering & Clustering Based Framework for Efficient XACML Policy Evaluation[J]. IEEE Transactions on Services Computing, 2011, 4(4): 300-313.
[5] 王雅哲, 冯登国, 张立武, 等. 基于多层次优化技术的XACML策略评估引擎[J]. 软件学报, 2011, 22(2): 323-338.
Wang Yazhe, Feng Dengguo, Zhang liwu, et al. XACML Policy Evaluation Engine Based on Multi-Level Optimization Technology[J]. Journal of Software, 2011, 22(2): 323-338.
[6] Le Traon Y, Mouelhi T, Pretschner A, et al. Test-driven Assessment of Access Control in Legacy Applications[C]//International Conference on Software Testing, Verification, and Validation. Piscataway: IEEE, 2008: 238-247.
[7] Mouelhi T, Fleurey F, Baudry B, et al. A Model-based Framework for Security Policy Specification, Deployment and Testing[C]//The 11th International Conference on Model Driven Engineering Languages and Systems. Heidelberg: Springer-Verlag, 2008: 537-552.
[8] Mouelhi T, Traon Y L, Baudry B. Transforming and Selecting Functional Test Cases for Security Policy Testing[C]//International Conference on Software Testing, Verification and Vahidation. Piscataway: IEEE, 2009: 171-180.
[9] Martin E, Xie Tao. Automated Test Generation for Access Control Policies[C]//International Workshop on Software Engineering for Secure Systems. Piscataway: IEEE, 2006: 752-753.
[10] Bertolino A, Daoudagh S, Lonetti F, et al. Automatic XACML Requests Generation for Policy Testing[C]//IEEE 5th International Conference on Software Testing, Verification and Validation. Piscataway: IEEE, 2012: 842-849. |