Search Results - "Daoudagh, Said"
-
1
Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal
Published in Sensors (Basel, Switzerland) (28-10-2021)“…The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and…”
Get full text
Journal Article -
2
COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing
Published in Array (New York) (01-03-2021)“…The way people access services in indoor environments has dramatically changed in the last year. The countermeasures to the COVID-19 pandemic imposed a…”
Get full text
Journal Article -
3
An automated framework for continuous development and testing of access control systems
Published in Journal of software : evolution and process (01-03-2023)“…Automated testing in DevOps represents a key factor for providing fast release of new software features assuring quality delivery. In this paper, we introduce…”
Get full text
Journal Article -
4
XACMET: XACML Testing & Modeling: An automated model-based testing solution for access control systems
Published in Software quality journal (01-03-2020)“…In the context of access control systems, testing activity is among the most adopted means to assure that sensible information or resources are correctly…”
Get full text
Journal Article -
5
Towards enhanced monitoring framework with smart predictions
Published in Logic journal of the IGPL (25-03-2024)“…Abstract Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when…”
Get full text
Journal Article -
6
XACMET: XACML Testing & Modeling
Published in Software quality journal (01-03-2020)“…In the context of access control systems, testing activity is among the most adopted means to assure that sensible information or resources are correctly…”
Get full text
Journal Article -
7
An automated model-based test oracle for access control systems
Published in 2018 IEEE/ACM 13th International Workshop on Automation of Software Test (AST) (28-05-2018)“…In the context of XACML-based access control systems, an intensive testing activity is among the most adopted means to assure that sensible information or…”
Get full text
Conference Proceeding -
8
Similarity testing for access control
Published in Information and software technology (01-02-2015)“…•A new approach for access control test prioritization based on similarity.•Two XACML similarity metrics, one of them exploiting the XACML policy…”
Get full text
Journal Article -
9
Testing of PolPA-based usage control systems
Published in Software quality journal (01-06-2014)“…The implementation of an authorization system is a critical and error-prone activity that requires a careful verification and testing process. As a matter of…”
Get full text
Journal Article -
10
2HCDL: Holistic Human-Centered Development Lifecycle
Published 08-04-2024“…The recent events affecting global society continuously highlight the need to change the development lifecycle of complex systems by promoting human-centered…”
Get full text
Journal Article -
11
Predictive Simulation for Building Trust Within Service-Based Ecosystems
Published in 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (21-03-2022)“…Modern vehicles extend their system components outside the typical physical body, relying on functionalities provided by off-board resources within complex…”
Get full text
Conference Proceeding -
12
An automated model-based test oracle for access control systems
Published 08-09-2018“…Proceedings of the 13th International Workshop on Automation of Software Test, pp. 2-8. ACM, 2018 In the context of XACML-based access control systems, an…”
Get full text
Journal Article -
13
Assessment of Access Control Systems Using Mutation Testing
Published in 2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity (01-05-2015)“…In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language…”
Get full text
Conference Proceeding -
14
XACMUT: XACML 2.0 Mutants Generator
Published in 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (01-03-2013)“…Testing of security policies is a critical activity and mutation analysis is an effective approach for measuring the adequacy of a test suite. In this paper,…”
Get full text
Conference Proceeding -
15
An Automated Testing Framework of Model-Driven Tools for XACML Policy Specification
Published in 2014 9th International Conference on the Quality of Information and Communications Technology (01-09-2014)“…Access Control is among the most important security mechanisms to put in place in order to secure applications. XACML is the de facto standard for storing and…”
Get full text
Conference Proceeding -
16
Automatic XACML Requests Generation for Policy Testing
Published in 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (01-04-2012)“…Access control policies are usually specified by the XACML language. However, policy definition could be an error prone process, because of the many…”
Get full text
Conference Proceeding -
17
A toolchain for model-based design and testing of access control systems
Published in 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD) (01-02-2015)“…In access control systems, aimed at regulating the accesses to protected data and resources, a critical component is the Policy Decision Point (PDP), which…”
Get full text
Conference Proceeding -
18
A Toolchain for Designing and Testing XACML Policies
Published in 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (01-03-2013)“…In modern pervasive application domains, such as Service Oriented Architectures (SOAs) and Peer-to-Peer (P2P) systems, security aspects are critical. Justified…”
Get full text
Conference Proceeding -
19
Testing of PolPA authorization systems
Published in Proceedings of the 7th International Workshop on Automation of Software Test (02-06-2012)“…The implementation of an authorization system is a difficult and error-prone activity that requires a careful verification and testing process. In this paper,…”
Get full text
Conference Proceeding -
20
Testing of PolPA authorization systems
Published in 2012 7th International Workshop on Automation of Software Test (AST) (01-06-2012)“…The implementation of an authorization system is a difficult and error-prone activity that requires a careful verification and testing process. In this paper,…”
Get full text
Conference Proceeding