tures through SecureUML language which is based on
Role based Access Control Model (RBAC).
Model-based testing has been investigated for
the XACML policy testing (Le Traon et al., 2007;
Pretschner et al., 2008). The approaches proposed
in (Le Traon et al., 2007; Pretschner et al., 2008) are
based on the representation of policy implied behav-
ior by means of models. Differently from these works
model based testing in this paper addresses testing of
the PDP engine. The authors of (Li et al., 2008) ad-
dress testing of the XACML PDP by running different
XACML implementations for the same test inputs and
detecting not correctly implemented XACML func-
tionalities when different outputs are observed. Dif-
ferently from our proposal, this approach randomly
generates requests for a given policy and requires
more PDP implementations for providing an oracle
facility by means of a voting mechanism. Our fo-
cus is to provide an integrated toolchain including test
case generation as well as policy and oracle speci-
fication for the PDP testing. A different solution in
the context of usage control is presented in (Bertolino
et al., 2012b) where the authors provide a fault model
and a test strategy able to highlight the problems,
vulnerabilities and faults that could occur during the
PDP implementation. This solution is specifically de-
signed for PolPA language, then it cannot be used for
XACML PDP testing.
6 DISCUSSION AND
CONCLUSION
This paper presented a toolchain for testing an
XACML PDP. The main facilities of the proposed
toolchain are: a model-based specification of the
XACML policy, a test suite generation and execution
engine, and the oracle definition. Two different ex-
periments confirmed the effectiveness of the toolchain
for testing a real PDP engine (Sun PDP). Concern-
ing the validity of the experiments, i.e. the amount of
confidence on the reported results, an important key
factor is the employed test set: we used X-CREATE
for deriving test suites, but it is likely that other test
sets may produce different results. In this paper, we
have applied our model based approach for deriving
LMS policy which includes 42 rules. Therefore, big-
ger policies need to be considered to guarantee the
scalability of the proposed approach. For future work,
we plan to extend the Test Archive including XACML
policies having a large number of rules, consider dif-
ferent test suites and improve the toolchain to support
the XACML 3.0.
ACKNOWLEDGEMENTS
The authors would like to thank Antonia Bertolino
and Yves Le Traon for their suggestions and useful
discussions.
REFERENCES
Bertolino, A., Daoudagh, S., Lonetti, F., and Marchetti, E.
(2012a). Automatic XACML requests generation for
policy testing. In Proc. of SECTEST, pages 842–849.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Mar-
tinelli, F., and Mori, P. (2012b). Testing of PolPA Au-
thorization Systems. In Proc. of AST, pages 8–14.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., and
Schilders, L. (2013). Automated testing of extensible
access control markup language-based access control
systems. IET Software, 7(4):203–212.
Bertolino, A., Lonetti, F., and Marchetti, E. (2010). Sys-
tematic XACML Request Generation for Testing Pur-
poses. In Proc. of EUROMICRO (SEAA), pages 3–11.
J
´
ez
´
equel, J.-M., Barais, O., and Fleurey, F. (2011). Model
driven language engineering with kermeta. In Gen-
erative and Transformational Techniques in Software
Engineering III, pages 201–221. Springer.
Le Traon, Y., Mouelhi, T., and Baudry, B. (2007). Testing
security policies: going beyond functional testing. In
Proc. of ISSRE, pages 93–102.
Li, N., Hwang, J., and Xie, T. (2008). Multiple-
implementation testing for XACML implementations.
In Proc. of TAV-WEB, pages 27–33.
Lodderstedt, T., Basin, D., and Doser, J. (2002). Se-
cureUML: A UML-based modeling language for
model-driven security. In The Unified Modeling Lan-
guage, pages 426–441. Springer.
Martin, E. and Xie, T. (2006). Automated Test Generation
for Access Control Policies. In Supplemental Proc. of
ISSRE.
OASIS (1 Feb 2005). eXtensible Access Control Markup
Language (XACML) Version 2.0.
OASIS Committee (2005). XACML Version 2.0 Confor-
mance Tests.
OMG (2004). UML 2.0 Testing Profile Specification.
http://utp.omg.org/.
Pretschner, A., Mouelhi, T., and Traon, Y. L. (2008).
Model-based tests for access control policies. In Proc.
of ICST, pages 338–347.
Sun Microsystems (2006). Sun’s XACML Implementation.
MODELSWARD2015-3rdInternationalConferenceonModel-DrivenEngineeringandSoftwareDevelopment
418