27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Objectives Partial<br />

graph<br />

Depth<br />

limit<br />

Visited<br />

states<br />

Time to<br />

generate<br />

generation the test<br />

cases<br />

53 BFS 100 12855 28 min<br />

and2s<br />

The next step in the testing process was the test case execution.<br />

It was performed on a web based prototype implementation<br />

and we used three different tools to get the<br />

results:<br />

1. The execution of the test cases was performed<br />

by using the ACS-Automated-testing<br />

tool (http://openacs.org/xowiki/<br />

acs-automated-testing).<br />

2. The tclwebtest (http://tclwebtest.<br />

sourceforge.net/) framework to describe<br />

the executable test cases for web applications.<br />

3. The Wireshark (http://www.wireshark.<br />

org/) tool was also used to capture the interaction of<br />

the hospitals within their information systems.<br />

After the execution of each test case we extracted from<br />

the collected traces the contexts of the hospitals. Within<br />

this set of contexts information we verified if the security<br />

rule presented in the test case held. According to the equation<br />

1 we said that the verdict after executing this test case<br />

was positive: a) if rule held in this context and the verdict<br />

provided by ACS-Automated-testing was positive, or b) if<br />

the rule did not hold in this context and the verdict provided<br />

by the ACS-Automated-testing tool was negative. As a result<br />

of this experiment we got with a positive verdict 48 test<br />

cases meanwhile we got with a false verdict for 5 test cases.<br />

For instance, one of the detected problems was that the system<br />

of an hospital did not notify to the doctors of the other<br />

hospital when a shared report was modified.<br />

5. Conclusion and Future Work<br />

In this paper we have presented our formal methodology<br />

to check interoperability security policies in an informal<br />

way. We have tried to describe our experience while testing<br />

complex environments by using our formal approach. In<br />

this paper we present our specification formalism. In particular,<br />

we focus on representing the interoperability security<br />

policies of these systems. Next, we show how we can automatically<br />

extract a finite set of tests from the specification<br />

and how these tests are run again the system under test in<br />

order to get a verdict.<br />

In addition with our testing framework, in this paper we<br />

have shown a case study in a controlled environment where<br />

the interoperability security rules were checked. We consider<br />

that the use of this testing methodology is very positive<br />

and encouraging as to support the use of formal methods.<br />

As future work we would like to add some extra (probabilistic)<br />

information in our tests in order to increase their<br />

coverage in a virtual organization environment.<br />

References<br />

[1] J. Bowen and M. G. Hinchey. Ten commandments of formal<br />

methods ... Ten years later. Computer, 39(1):40–48, 2006.<br />

[2] J. Cao, J. Chen, H. Zhao, and M. Li. A policy-based authorization<br />

model for workflow-enabled dynamic process management.<br />

Journal of Network and Computer Applications,<br />

32(2):412–422, 2009.<br />

[3] A. Cavalli, A. Benameur, W. Mallouli, and K. Li. A passive<br />

testing approach for security checking and its practical usage<br />

for web services monitoring. In 9th Conf. Int. sur Les<br />

NOuvelles TEchnologies de la REpartition, NOTERE 2009.<br />

ACM, 2009.<br />

[4] A. Cavalli, D. Lee, C. Rinderknecht, and F. Zaïdi. Hitor-Jump:<br />

An algorithm for embedded testing with applications<br />

to IN services. In Formal Description Techniques<br />

for Distributed <strong>Systems</strong> and Communication Protocols (XII),<br />

and Protocol Specification, Testing, and Verification (XIX),<br />

pages 41–56. Kluwer Academic Publishers, 1999.<br />

[5] A. Cavalli, E. M. D. Oca, W. Mallouli, and M. Lallali. Two<br />

complementary tools for the formal testing of distributed<br />

systems with time constraints. In 12th IEEE/ACM Int. Symposium<br />

on Distributed Simulation and Real-Time Applications,<br />

DS-RT’08, pages 315–318. IEEE Computer Society,<br />

2008.<br />

[6] C. Coma, N. Cuppens-Boulahia, F. Cuppens, and A. Cavalli.<br />

Interoperability of context based system policies using<br />

O2O contract. In 4th Int. Conf. on Signal-Image Technology<br />

& Internet-based <strong>Systems</strong>, SITIS’08, pages 137–144. IEEE<br />

Computer Society, 2008.<br />

[7] F. Cuppens and N. Cuppens-Boulahia. Modeling contextual<br />

security policies. International Journal of Information Security,<br />

7(4):285–305, 2008.<br />

[8] U. Franke. Managing virtual web organizations in the 21st<br />

century. IGI Publishing, 2002.<br />

[9] M. Gogolla. Benefits and problems of formal methods. In<br />

9th Ada-Europe Int. Conf. on Reliable Software Technologies,<br />

Ada-Europe’04, LNCS 3063, pages 1–15. Springer,<br />

2004.<br />

[10] R. M. Hierons, K. Bogdanov, J. Bowen, R. Cleaveland,<br />

J. Derrick, J. Dick, M. Gheorghe, M. Harman, K. Kapoor,<br />

P. Krause, G. Luettgen, A. Simons, S. Vilkomir, M. Woodward,<br />

and H. Zedan. Using formal methods to support testing.<br />

ACM Computing Surveys, 41(2), 2009.<br />

[11] M. E. Maarabani, I. Hwang, and A. Cavalli. A formal<br />

approach for interoperability testing of security rules. In<br />

6th Int. Conf. on Signal-Image Technology & Internet-based<br />

<strong>Systems</strong>, SITIS’10, pages 277–284. IEEE Computer Society,<br />

2010.<br />

[12] R. Salay and J. Mylopoulos. The model role level: a vision.<br />

In 29th international conference on Conceptual modeling,<br />

ER’10, pages 76–89. Springer, 2010.<br />

469

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!