Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Definition 3

Handbook of Research on Information Security and Assurance
Heuristics based test suite generation technique. In this procedure heuristics are used to reduce the size of the model and of the test set. These heuristics are similar to the concept of state abstractions as used in various verification techniques.
Published in Chapter:
Enterprise Access Control Policy Engineering Framework
Arjmand Samuel (Purdue University, USA)
Copyright: © 2009 |Pages: 10
DOI: 10.4018/978-1-59904-855-0.ch028
Abstract
This chapter outlines the overall access control policy engineering framework in general and discusses the subject of validation of access control mechanisms in particular. Requirements of an access control policy language are introduced and their underlying organizational philosophy is discussed. Next, a number of access control models are discussed and a brief outline of various policy verification approaches is presented. A methodology for validation of access control implementations is presented along with two approaches for test suite generation, that is, complete FSM based and heuristics based. This chapter is aimed at providing an overview of the access control policy engineering activity and in-depth view of one approach to device test cases for an access control implementation mechanism.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR