
%%%%%%%%%%%%%%%%%%%%%%% file typeinst.tex %%%%%%%%%%%%%%%%%%%%%%%%%
%
% This is the LaTeX source for the instructions to authors using
% the LaTeX document class 'llncs.cls' for contributions to
% the Lecture Notes in Computer Sciences series.
% http://www.springer.com/lncs       Springer Heidelberg 2006/05/04
%
% It may be used as a template for your own input - copy it
% to a new file with a new name and use it as the basis
% for your article.
%
% NB: the document class 'llncs' has its own and detailed documentation, see
% ftp://ftp.springer.de/data/pubftp/pub/tex/latex/llncs/latex2e/llncsdoc.pdf
%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


\documentclass[runningheads,a4paper]{llncs}

\usepackage{amssymb}
\setcounter{tocdepth}{3}
\usepackage{graphicx}

%########################### Begin - Custom Commands ###########################

%\usepackage{latex8}
\usepackage{times}
\usepackage{lineno} % linenumbering, we use it within a figure
\usepackage{verbatim} % linenumbering, we use it within a figure

\input{macros}

\usepackage{color}
\usepackage{cite}
\usepackage{url}
\usepackage{graphicx} % remove it due to duplication with an existing one
\usepackage{latexsym}
\usepackage{psfrag}
\usepackage{comment}
\usepackage{lineno}
\usepackage[ruled,vlined]{algorithm2e}
\usepackage{listings}

\lstset{escapeinside={/*@}{@*/}}

\newcommand{\ie}{{\sl i.e.}}
\newcommand{\eg}{{\sl e.g.}}
\newcommand{\etc}{{\sl etc.}}
\newcommand{\etal}{{\sl et al.\ }}


\newcommand{\FixJeeHyun}[1]{}
\newcommand{\CommentJeeHyun}[1]{}
%\newcommand{\redbold}[1]{ \textbf{\color{red}{#1}}
%\newcommand{\FixJeeHyun}[1]{{\large\textbf{FIXJeeHyun}}\color{red}{#1}\color{black}{}{\large\textbf{FIXJeeHyun}}}
%\newcommand{\CommentJeeHyun}[1]{{\large\textbf{COMMENTJeeHyun}}#1{\large\textbf{COMMENTJeeHyun}}}



%########################### End - Custom Commands ###########################


\usepackage{url}
\urldef{\mailsa}\path|jhwang4@ncsu.edu, xie@csc.ncsu.edu,|
\urldef{\mailsb}\path|{donia.elkateb, tejeddine.mouelhi, yves.letraon}@uni.lu|
%\urldef{\mailsc}\path|erika.siebert-cole, peter.strasser, lncs}@springer.com|    
\newcommand{\keywords}[1]{\par\addvspace\baselineskip
\noindent\keywordname\enspace\ignorespaces#1}

\begin{document}

\mainmatter  % start of an individual contribution

% first the title is needed
\title{Test Selection and Augmentation of Regression System Tests for Access Control Policy Evolution}

% a short form should be given in case it is too long for the running head
\titlerunning{Test Selection and Augmentation of Regression System Tests}

% the name(s) of the author(s) follow(s) next
%
% NB: Chinese authors should write their first names(s) in front of
% their surnames. This ensures that the names appear correctly in
% the running heads and the author index.
%
%\author{
%JeeHyun Hwang$^1$ \hspace*{0.15in} Tao Xie$^1$\hspace*{0.15in} Donia El Kateb$^2$ \hspace*{0.15in} Tejeddine Mouelhi$^2$  \hspace*{0.15in} Yves Le Traon$^2$\\
%$^1$\small{Department of Computer Science, North Carolina State University, Raleigh, USA}\\
%$^2$\small{Security, Reliability and Trust Interdisciplinary Research Center, SnT, University of Luxembourg}\\
%\small{\texttt{jhwang4@ncsu.edu}}\hspace*{0.3in}\small{\texttt{xie@csc.ncsu.edu}}\hspace*{0.3in}\small{\texttt{\{donia.elkateb,tejeddine.mouelhi,yves.letraon\}@uni.lu}}\\
%}


\author{JeeHyun Hwang$^1$\and Tao Xie$^1$\and Donia El Kateb$^2$\and\\ Tejeddine Mouelhi$^2$\and Yves Le Traon$^2$
%\thanks{Please note that the LNCS Editorial assumes that all authors have used
%the western naming convention, with given names preceding surnames. This determines
%the structure of the names in the running heads and the author index.}%
}

\authorrunning{JeeHyun Hwang et al.}
% (feature abused for this document to repeat the title also on left hand pages)

% the affiliations are given next; don't give your e-mail address
% unless you accept that it will be published
\institute{$^1$Department of Computer Science, North Carolina State University, Raleigh, USA\\
$^2$Security, Reliability and Trust Interdisciplinary Research Center, SnT,\\ University of Luxembourg, Luxembourg\\
\mailsa\\
\mailsb\\
%\mailsc\\
%\url{http://www.springer.com/lncs}
}

%
% NB: a more complex sample for affiliations and the mapping to the
% corresponding authors can be found in the file "llncs.dem"
% (search for the string "\mainmatter" where a contribution starts).
% "llncs.dem" accompanies the document class "llncs.cls".
%

\toctitle{Lecture Notes in Computer Science}
\tocauthor{Authors' Instructions}
\maketitle

%\linenumbers
%\pagewiselinenumbers % line numbers for each page

\begin{abstract}
As security requirements of software often change during development and maintenance,
developers may modify policies according to the requirements.
%For example, new security requirements include new security concerns to be added into a policy.
%Developers may change policies without changing program code related to actual system functionality.
In order to increase confidence that the modification of policies is correct and
does not introduce unexpected behavior, developers conduct regression testing.
For regression testing, rerunning all of existing system test cases is costly and time-consuming, especially for large-scale systems. In order to reduce the cost of regression testing, we develop a safe regression-test-selection approach, which selects every test case that may reveal a fault in program code impacted by policy changes. Our approach develops three techniques: : the first one is based on mutation analysis (that converts each rule's decision in turn and execute and find test cases related to each rule), the second one is based on coverage analysis (that records which rules are evaluated by executing each test case), and the third one is based on evaluated decisions of requests issued from test cases. However, if existing test cases may not sufficiently cover all of rules $Rs$ of the policy impacted by the changes, our selected test cases may not achieve sufficient coverage on $Rs$. To address this issue, we develop a test augmentation technique, which complements our test-selection techniques by generating additional test cases to cover not-covered-impacted-rules by existing test cases.
We evaluate our approach on three real world Java programs interacting with policies. Our evaluation results show that our test selection techniques find XX test cases from an existing test cases, which covers only XX\% of impacted rules on average. Our evaluation results show that our test augmentation technique generate additional test cases to cover 100\% of the impacted rules.
\keywords{access control policy evolution, test selection, test augmentation, regression testing, reliability}
\end{abstract}



\input{intro} % 80% done
\input{background}
%%\input{example}
\input{approach}

\input{implementation}
\input{experiment}
\input{related}
\input{conclusion}

%\section{The References Section}\label{references}
%
%In order to permit cross referencing within LNCS-Online, and eventually
%between different publishers and their online databases, LNCS will,
%from now on, be standardizing the format of the references. This new
%feature will increase the visibility of publications and facilitate
%academic research considerably. Please base your references on the
%examples below. References that don't adhere to this style will be
%reformatted by Springer. You should therefore check your references
%thoroughly when you receive the final pdf of your paper.
%The reference section must be complete. You may not omit references.
%Instructions as to where to find a fuller version of the references are
%not permissible.
%
%We only accept references written using the latin alphabet. If the title
%of the book you are referring to is in Russian or Chinese, then please write
%(in Russian) or (in Chinese) at the end of the transcript or translation
%of the title.
%
%The following section shows a sample reference list with entries for
%journal articles \cite{jour}, an LNCS chapter \cite{lncschap}, a book
%\cite{book}, proceedings without editors \cite{proceeding1} and
%\cite{proceeding2}, as well as a URL \cite{url}.
%Please note that proceedings published in LNCS are not cited with their
%full titles, but with their acronyms!



\raggedright
\bibliographystyle{plain}
\bibliography{yangtse}


%\begin{thebibliography}{4}
%
%\bibitem{jour} Smith, T.F., Waterman, M.S.: Identification of Common Molecular
%Subsequences. J. Mol. Biol. 147, 195--197 (1981)
%
%\bibitem{lncschap} May, P., Ehrlich, H.C., Steinke, T.: ZIB Structure Prediction Pipeline:
%Composing a Complex Biological Workflow through Web Services. In: Nagel,
%W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128,
%pp. 1148--1158. Springer, Heidelberg (2006)
%
%\bibitem{book} Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing
%Infrastructure. Morgan Kaufmann, San Francisco (1999)
%
%\bibitem{proceeding1} Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid
%Information Services for Distributed Resource Sharing. In: 10th IEEE
%International Symposium on High Performance Distributed Computing, pp.
%181--184. IEEE Press, New York (2001)
%
%\bibitem{proceeding2} Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the
%Grid: an Open Grid Services Architecture for Distributed Systems
%Integration. Technical report, Global Grid Forum (2002)
%
%\bibitem{url} National Center for Biotechnology Information, \url{http://www.ncbi.nlm.nih.gov}
%
%\end{thebibliography}



\end{document}
