\relax 
\citation{dac,mac,rbac,orbac}
\@writefile{toc}{\contentsline {title}{Automated Code-based Location Of Policy Enforcement Points}{1}}
\@writefile{toc}{\authcount {2}}
\@writefile{toc}{\contentsline {author}{Yehia ElRakaiby$^1$, Tejeddine Mouelhi$^1$, Donia El Kateb$^2$ \and Yves Le Traon$^1$ }{1}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\newlabel{sec:introduction}{{1}{1}}
\citation{legacy}
\@writefile{toc}{\contentsline {section}{\numberline {2}Context}{3}}
\newlabel{sec:context}{{2}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Access Control Request Processing}}{3}}
\newlabel{peppdp}{{1}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Possible PEP Configurations}}{4}}
\newlabel{Possible PEP Configurations}{{2}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {3}Approach Description}{4}}
\newlabel{sec:approach}{{3}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces The overall Approach}}{5}}
\newlabel{Approach Description}{{3}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Static Analysis: Identification of Possible Accesses}{5}}
\newlabel{sec:static_analysis}{{3.1}{5}}
\@writefile{toc}{\contentsline {subsubsection}{Identification of Possible Accesses}{6}}
\citation{orbac}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Application Class Diagram}}{8}}
\newlabel{implicitSecurityMechanism}{{4}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Detection of Redundant and Impossible Rules in Policies}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Dynamic Analysis}{9}}
\newlabel{sec:dynamic_analysis}{{3.3}{9}}
\citation{DeMillo}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Possible Accesses}}{10}}
\newlabel{table}{{5}{10}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Security Test Case Example}}{11}}
\newlabel{Security Test Example}{{6}{11}}
\@writefile{toc}{\contentsline {subsubsection}{PEPs Location By Mutation Testing Applied on Access Control Policies}{11}}
\citation{AOP}
\citation{aspectJ}
\@writefile{toc}{\contentsline {subsubsection}{PEPs detection based on dynamic analysis}{12}}
\citation{roadmap}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Tracing Test Execution Aspect }}{13}}
\newlabel{aspect}{{7}{13}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Evaluation Results}{13}}
\newlabel{sec:experiments}{{4}{13}}
\citation{accesscontrolaspect}
\citation{legacy}
\citation{legacy}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces PEPs localization through Trace analysis }}{14}}
\newlabel{aspect}{{8}{14}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces PEPs Distribution}}{14}}
\newlabel{table1}{{1}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Related Work and Conclusion}{14}}
\newlabel{sec:conclusion}{{5}{14}}
\bibstyle{abbrv}
\bibdata{sigproc}
\bibcite{AOP}{1}
\bibcite{mac}{2}
\bibcite{DeMillo}{3}
\bibcite{roadmap}{4}
\bibcite{rbac}{5}
\bibcite{orbac}{6}
\bibcite{aspectJ}{7}
\bibcite{dac}{8}
\bibcite{accesscontrolaspect}{9}
\bibcite{legacy}{10}
