作者: Yves Le Traon , Tejeddine Mouelhi , Alexander Pretschner , Benoit Baudry
DOI: 10.1109/ICST.2008.60
关键词:
摘要: If access control policy decision points are not neatly separated from the business logic of a system, evolution security likely leads to necessity changing system's code base. This is often case with legacy systems. We present test- driven methodology assess flexibility property that describes degree coupling between and system. A low indicates modification will lead substantial changes code. In this paper, we analyze notion which related presence hidden implicit mechanisms in logic. detail how testing can be used for detecting such it may drive incremental policy. use several studies illustrate validate methodology.