Author of the publication

Testing Security Policies: Going Beyond Functional Testing.

, , and . ISSRE, page 93-102. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mouelhi, Tejeddine
add a person with the name Mouelhi, Tejeddine
 

Other publications of authors with the same name

Towards a Full Support of Obligations in XACML., , , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 213-221. Springer, (2014)Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies., , , and . ICST Workshops, page 72-79. IEEE Computer Society, (2010)A Generic Metamodel For Security Policies Mutation., , and . ICST Workshops, page 278-286. IEEE Computer Society, (2008)Refactoring access control policies for performance improvement., , , , and . ICPE, page 323-334. ACM, (2012)Transforming and Selecting Functional Test Cases for Security Policy Testing., , and . ICST, page 171-180. IEEE Computer Society, (2009)Testing Obligation Policy Enforcement Using Mutation Analysis., , and . ICST, page 673-680. IEEE Computer Society, (2012)A model-based approach to automated testing of access control policies., , , , and . SACMAT, page 209-218. ACM, (2012)Model-driven adaptive delegation., , , , and . AOSD, page 61-72. ACM, (2013)Inroads in Testing Access Control., , and . Advances in Computers, (2015)Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets., , , , and . IEEE Trans. Computers, 64 (9): 2490-2505 (2015)