Security policy testing using vulnerability exploit chaining.
Vianney DarmaillacqPublished in: ICST Workshops (2008)
Keyphrases
- security policies
- model based testing
- access control
- network security
- distributed systems
- security management
- security requirements
- access control systems
- penetration testing
- security concerns
- access control policies
- network management
- ubiquitous computing environments
- test cases
- security architecture
- home network
- software testing
- data processing
- test suite
- event logs
- unauthorized access
- machine learning
- data mining