Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations.
Ronghai YangGuanchen LiWing Cheong LauKehuan ZhangPili HuPublished in: AsiaCCS (2016)
Keyphrases
- information security
- intrusion detection
- access control
- fault injection
- security issues
- information assurance
- security requirements
- network security
- efficient implementation
- test cases
- security problems
- security mechanisms
- data driven
- security policies
- intrusion detection system
- model free
- database
- functional requirements
- computer security
- security protocols
- cyber security
- authentication protocol
- malware detection
- security management