A meta-heuristic for access control test data creation in access control model testing
dc.contributor.author | Winterstetter, Matthias | |
dc.contributor.author | Kurowski, Sebastian | |
dc.contributor.editor | Fritsch, Lothar | |
dc.contributor.editor | Roßnagel, Heiko | |
dc.contributor.editor | Hühnlein, Detlef | |
dc.date.accessioned | 2017-08-28T23:20:00Z | |
dc.date.available | 2017-08-28T23:20:00Z | |
dc.date.issued | 2017 | |
dc.description.abstract | User to Document Access data is in most cases protected and as such difficult to acquire for research purposes. This work seeks to circumvent this problem by creating research data on the basis of reference processes through the evolutionary Algorithm. Data created through this method, while not as accurate as real data, still has it’s foundation in reality through the reference process and can as such be used as a replacement. | en |
dc.identifier.isbn | 978-3-88579-671-8 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | Open Identity Summit 2017 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-277 | |
dc.subject | evolutionary algorithm | |
dc.subject | access control | |
dc.subject | meta-heuristic | |
dc.subject | test data | |
dc.title | A meta-heuristic for access control test data creation in access control model testing | en |
gi.citation.endPage | 158 | |
gi.citation.startPage | 153 | |
gi.conference.date | 5.-6. October 2017 | |
gi.conference.location | Karlstad, Sweden | |
gi.conference.sessiontitle | Further Conference Contributions |
Dateien
Originalbündel
1 - 1 von 1