Author of the publication

Automated reverse engineering of role-based access control policies of web applications.

, , , , and . J. Syst. Softw., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Goal-Oriented Software Testing Methodology., , and . AOSE, volume 4951 of Lecture Notes in Computer Science, page 58-72. Springer, (2007)Automated Inference of Access Control Policies for Web Applications., , , and . SACMAT, page 27-37. ACM, (2015)Automated Detection of Discontinuities in Models Inferred from Execution Traces., , and . ICST Workshops, page 286-293. IEEE Computer Society, (2011)Automated reverse engineering of role-based access control policies of web applications., , , , and . J. Syst. Softw., (2022)Challenges in Audit Testing of Web Services., , and . ICST Workshops, page 103-106. IEEE Computer Society, (2011)Change Sensitivity Based Prioritization for Audit Testing of Webservice Compositions., , and . ICST Workshops, page 357-365. IEEE Computer Society, (2011)Ontology-based test generation for multiagent systems., , and . AAMAS (3), page 1315-1320. IFAAMAS, (2008)Testing Techniques for Software Agents.. University of Trento, Italy, (2009)base-search.net (ftutrentophd:oai:eprints-phd.biblio.unitn.it:68).Automated inference of classifications and dependencies for combinatorial testing., and . ASE, page 622-627. IEEE, (2013)Interpolated n-grams for model based testing., , and . ICSE, page 562-572. ACM, (2014)