Proceedings of the Conference on The Future of Software Engineering
Gamma system: continuous evolution of software after deployment
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Passive testing and applications to network management
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Profiling Deployed Software: Assessing Strategies and Testing Opportunities
IEEE Transactions on Software Engineering
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
Software Testing Research: Achievements, Challenges, Dreams
FOSE '07 2007 Future of Software Engineering
Distributed In Vivo Testing of Software Applications
ICST '08 Proceedings of the 2008 International Conference on Software Testing, Verification, and Validation
Efficient online monitoring of web-service SLAs
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Web services and web service security standards
Information Security Tech. Report
Evaluation of online testing for services: a case study
Proceedings of the 2nd International Workshop on Principles of Engineering Service-Oriented Systems
Systematic XACML Request Generation for Testing Purposes
SEAA '10 Proceedings of the 2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications
Hi-index | 0.00 |
Access Policy compliance testing within a trust network helps ensure that the services available to users are reliable, secure and trustworthy. In the TAS3 project Access Policy testing is a vital function of the trust network in which users and service providers interact. User-centric security management is enabled by using automated compliance testing using the TAS3 Audit Bus and OCT components to monitor service state and provide users with a new level of privacy protection in networks of services. The components have been deployed and tested in an employability scenario and present a foundation from which a new level of security for emerging service-based applications can be developed.