An Investigation on Testing RBAC Constraints.ppt
《An Investigation on Testing RBAC Constraints.ppt》由会员分享,可在线阅读,更多相关《An Investigation on Testing RBAC Constraints.ppt(19页珍藏版)》请在麦多课文档分享上搜索。
1、An Investigation on Testing RBAC Constraints,Presented by Jiao Chen 04/29/2003,Project Objectives,Develop coverage criteria for testing RBAC constraints Develop algorithms for statically checking the enforcement of RBAC constraints Generating test cases for RBAC constraints based on the developed co
2、verage criteria,Significance of the Problem,The RBAC has generated great interest in the security community as a flexible approach in access control. Constraints are an important aspect of access control and are a powerful mechanism for laying out a higher-level organization policy.,Significance of
3、the Problem (contd),Issues of specification of constraints have received surprisingly little attention in the research literature 1. Few literature discusses the testing of the RBAC constraints.,Coverage Criteria,Coverage is an operational definition for a complete test suite. It is important to def
4、ine the coverage criteria before generating test case. Classical coverage criteria, like statement coverage, c-use coverage, etc. are not suitable for testing RBAC constraints. New coverage criteria are needed.,Details of My Approach,The work of this project is based on the constraints specification
5、 described in Ahn G-J. and Shin M. E.s 1 paper. For each kind of RBAC constraints, static checking algorithm and corresponding coverage criterion is developed respectively. A case study is performed. Test cases are generated following the coverage criteria developed.,Category of Role-based Constrain
6、ts,Separation of duty constraints Prerequisite constraints Cardinality constraints,Separation of Duty Constraints,Rule 1: Conflicting roles cannot be assigned to the same user. Criterion 1: All conflicting role pairs in the conflicting role set are exercised in negative way. That means, for each con
7、flicting role pair, at least one test case should cover the violation of that conflicting role pair.,Static checking algorithm for Rule 1,Input: Conflicting role set A = (r1, r1c), (r2, r2c), (ri, ric), , (rn, rnc), Assigned role set B = (r1u1, r2u1, r3u1, riu1, , rnu1), (r1u2, r2u2, r3u2, riu2i, ,
8、rnu2), (r1u3, r2u3, r3u3, riu3, , rnu3), , (r1un, r2un, r3un, riun, , rnun) Output: True - The system enforces Rule 1False - The system does not enforce Rule 1 Initialization: flag = 0 For each user in the assigned role set BFor each role assigned to that user, riuiGo through the conflicting role se
9、t Aif riui is one of riflag = 1Go through the corresponding assigned roles of that user,i.e., (r1u1, r2u1, r3u1, riu1, , rnu1) if riui(r1u1, r2u1, r3u1, riu1, , rnu1) and riui = ricflag = 2if flag = 2return false, exitelsereturn trueend for end for,Separation of Duty Constraints (contd),Rule 2: Conf
10、licting permissions cannot be assigned to the same role. Criterion 2: All conflicting permission pairs in the conflicting permission set are exercised in negative way. That means, for each conflicting permission pair, at least one test case should cover the violation of that conflicting permission p
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANINVESTIGATIONONTESTINGRBACCONSTRAINTSPPT
