before in the literature related to the assessment of
XACML based systems: during the test suite execu-
tion, there is the possibility that different sets of dis-
tinct Mutated PDPs can be executed by different test
strategies. Ignoring such data evidence and compar-
ing the test strategies just in terms of effectiveness or
APFD could really produce invalid conclusions and
therefore wrong test strategy selection. By leveraging
XMF and the data collected during the experiment ex-
ecution, the mitigation of such a risk was possible and
a correct evaluation provided.
Concerning the validity of the experiment, i.e., the
amount of confidence in the results, the important key
factors are Subjects, Object and Parameters of the ex-
periment. Here below the strategies used to minimize
the threats to validity are described.
With respect to confidence in the results, the con-
trolled experiment used data and measurements that
satisfy the principles of independence, homogeneity
and normality.
With respect to internal validity the crucial points
are: the policy used, the PDP engine selected and the
tool integrated for the generation of the mutants set.
Concerning the Subject of the experiment, the poli-
cies included in the XMF framework are a good rep-
resentative of real world XACML Policies, because
they contain most of the constructs and functionalities
actually used in the practice. However different poli-
cies, like for instance those of XACML conformance
test suite, may produce different results. The Object
of the experiment, i.e., the Sun PDP implementation
integrated in the XMF framework, is one of the most
adopted in access control systems and therefore its
quality and performance are well established. How-
ever, different XACML-based implementations could
be considered. Finally, considering the Parameter of
the experiment, i.e., the tool integrated for the deriva-
tion of the mutants set, we included the already ex-
isting µJava tool because it is one of the most widely
used in object oriented environment. Previous works
guarantee that its performance can be comparable to
others available, however it could be possible that
other mutation tools may produce different results.
With respect to external validity, we compared
two test strategies: Multiple Combinatorial test strat-
egy, provided by X-CREATE, which is one of the
most referred in the context of access control systems,
and an innovative one, the XACMET test strategy,
so as to have elements of comparable performance.
Other strategies could have been considered and dif-
ferent results provided, but the purpose was only to
show the use of controlled experiment for test strat-
egy comparison and not to select the best one.
For future work, we plan to generalize our con-
trolled experiment by considering different subjects,
for instance the conformance test suite, different ob-
jects, i.e., different PDPs, and extend the set of con-
sidered dependent variables. Moreover, we plan to
define and perform further controlled experiments in
the context of access control for evaluating other test-
ing techniques, for mutation generation or test suites
reduction or prioritization.
ACKNOWLEDGEMENTS
This work is partially supported by CyberSec4Europe
Grant agreement ID: 830929.
REFERENCES
(2019). Fedora Commons Repository Software. http:
//fedora-commons.org/.
Basili, V. R. and Rombach, H. D. (1988). The tame
project: towards improvement-oriented software envi-
ronments. IEEE Transactions on Software Engineer-
ing, 14(6):758–773.
Bertolino, A., Daoudagh, S., Kateb, D. E., Henard, C.,
Traon, Y. L., Lonetti, F., Marchetti, E., Mouelhi, T.,
and Papadakis, M. (2015). Similarity testing for ac-
cess control. Information and Software Technology,
58:355 – 372.
Bertolino, A., Daoudagh, S., Lonetti, F., and Marchetti, E.
(2012a). Automatic XACML Requests Generation for
Policy Testing. In Proc. of ICST, pages 842–849.
Bertolino, A., Daoudagh, S., Lonetti, F., and Marchetti, E.
(2012b). Modelling and Testing of XACML policies.
In 2012-TR-010.
Bertolino, A., Daoudagh, S., Lonetti, F., and Marchetti., E.
(2013a). XACMUT: XACML 2.0 Mutants Generator.
In Proc. of 8th International Workshop on Mutation
Analysis, pages 28–33.
Bertolino, A., Daoudagh, S., Lonetti, F., and Marchetti, E.
(2018). An automated model-based test oracle for ac-
cess control systems. In Proceedings of the 13th In-
ternational Workshop on Automation of Software Test,
AST@ICSE 2018, Gothenburg, Sweden, May 28-29,
2018, pages 2–8.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Mar-
tinelli, F., and Mori, P. (2014). Testing of polpa-
based usage control systems. Software Quality Jour-
nal, 22(2):241–271.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., and
Schilders, L. (2013b). Automated testing of extensible
access control markup language-based access control
systems. IET Software, 7(4):203–212.
Briand, L. and Labiche, Y. (2004). Empirical studies of soft-
ware testing techniques: Challenges, practical strate-
gies, and future research. SIGSOFT Softw. Eng. Notes,
29(5):1–3.
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment
117