{"id":"https://openalex.org/W3116918621","doi":"https://doi.org/10.1145/3393822.3432330","title":"Continuous Development and Testing of Access and Usage Control","display_name":"Continuous Development and Testing of Access and Usage Control","publication_year":2020,"publication_date":"2020-11-06","ids":{"openalex":"https://openalex.org/W3116918621","doi":"https://doi.org/10.1145/3393822.3432330","mag":"3116918621"},"language":"en","primary_location":{"id":"doi:10.1145/3393822.3432330","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3393822.3432330","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 European Symposium on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042612720","display_name":"Said Daoudagh","orcid":"https://orcid.org/0000-0002-3073-6217"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]},{"id":"https://openalex.org/I122991210","display_name":"Istituto di Scienza e Tecnologie dell'Informazione \"Alessandro Faedo\"","ror":"https://ror.org/05kacka20","country_code":"IT","type":"facility","lineage":["https://openalex.org/I122991210","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Said Daoudagh","raw_affiliation_strings":["University of Pisa and ISTI-CNR, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"University of Pisa and ISTI-CNR, Pisa, Italy","institution_ids":["https://openalex.org/I122991210","https://openalex.org/I108290504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045369535","display_name":"Francesca Lonetti","orcid":"https://orcid.org/0000-0002-4864-2219"},"institutions":[{"id":"https://openalex.org/I122991210","display_name":"Istituto di Scienza e Tecnologie dell'Informazione \"Alessandro Faedo\"","ror":"https://ror.org/05kacka20","country_code":"IT","type":"facility","lineage":["https://openalex.org/I122991210","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesca Lonetti","raw_affiliation_strings":["ISTI-CNR, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"ISTI-CNR, Pisa, Italy","institution_ids":["https://openalex.org/I122991210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007417940","display_name":"Eda Marchetti","orcid":"https://orcid.org/0000-0003-4223-8036"},"institutions":[{"id":"https://openalex.org/I122991210","display_name":"Istituto di Scienza e Tecnologie dell'Informazione \"Alessandro Faedo\"","ror":"https://ror.org/05kacka20","country_code":"IT","type":"facility","lineage":["https://openalex.org/I122991210","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Eda Marchetti","raw_affiliation_strings":["ISTI-CNR, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"ISTI-CNR, Pisa, Italy","institution_ids":["https://openalex.org/I122991210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042612720"],"corresponding_institution_ids":["https://openalex.org/I108290504","https://openalex.org/I122991210"],"apc_list":null,"apc_paid":null,"fwci":1.3908,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87350581,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7657333612442017},{"id":"https://openalex.org/keywords/devops","display_name":"DevOps","score":0.720889151096344},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.6245766878128052},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5608192682266235},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5299179553985596},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.512446939945221},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.449739545583725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21424409747123718},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.10324636101722717}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7657333612442017},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.720889151096344},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.6245766878128052},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5608192682266235},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5299179553985596},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.512446939945221},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.449739545583725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21424409747123718},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.10324636101722717},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3393822.3432330","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3393822.3432330","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 European Symposium on Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:dnet:people______::e67c68ac44229d7ba756f4b8826dfb56","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S7407055261","display_name":"ISTI Open Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1423289960","https://openalex.org/W1615568607","https://openalex.org/W2001294232","https://openalex.org/W2003298334","https://openalex.org/W2041713059","https://openalex.org/W2055040206","https://openalex.org/W2118328848","https://openalex.org/W2156835762","https://openalex.org/W2168894761","https://openalex.org/W2282563997","https://openalex.org/W2296989414","https://openalex.org/W2418186419","https://openalex.org/W2484284042","https://openalex.org/W2531061282","https://openalex.org/W2725449579","https://openalex.org/W2753691335","https://openalex.org/W2759389584","https://openalex.org/W2786372306","https://openalex.org/W2790215732","https://openalex.org/W2803147356","https://openalex.org/W2810528031","https://openalex.org/W2811279793","https://openalex.org/W2887457724","https://openalex.org/W2946943527","https://openalex.org/W2970752633","https://openalex.org/W2991495393","https://openalex.org/W3002355222","https://openalex.org/W3101184228","https://openalex.org/W4233339973","https://openalex.org/W6684456340"],"related_works":["https://openalex.org/W2351416088","https://openalex.org/W2349247816","https://openalex.org/W1520745363","https://openalex.org/W1552878720","https://openalex.org/W130718849","https://openalex.org/W1993102289","https://openalex.org/W2114574764","https://openalex.org/W2348423860","https://openalex.org/W2544881096","https://openalex.org/W2400010433"],"abstract_inverted_index":{"Context:":[0],"Development":[1],"and":[2,52,56,77,97,156,163,176,181],"testing":[3,53,157,177],"of":[4,24,35,43,49,54,106,134,151,178],"access/usage":[5,25],"control":[6,26,58,144,183],"systems":[7,184],"is":[8,38,158],"a":[9,64,69,81,103,148],"growing":[10],"research":[11,44,70,75],"area.":[12],"With":[13,84],"new":[14],"trends":[15],"in":[16,46,100,124],"software":[17,129],"development":[18,23,51,155],"such":[19],"as":[20,68],"DevOps,":[21],"the":[22,47,74,85,95,135,140,152,165,179,186],"also":[27,190],"has":[28],"to":[29,39,72],"evolve.":[30],"Objective:":[31],"The":[32,61],"main":[33],"aim":[34],"this":[36,113],"paper":[37,62],"provide":[40],"an":[41],"overview":[42],"proposals":[45,153],"area":[48],"continuous":[50,174],"access":[55,143,182],"usage":[57,180],"systems.":[59],"Method:":[60],"uses":[63],"Systematic":[65],"Literature":[66],"Review":[67],"method":[71],"define":[73],"questions":[76],"answer":[78],"them":[79],"following":[80],"systematic":[82],"approach.":[83],"specified":[86],"search":[87],"string,":[88],"210":[89],"studies":[90,109,120,136],"were":[91],"retrieved.":[92],"After":[93],"applying":[94],"inclusion":[96],"exclusion":[98],"criteria":[99],"two":[101],"phases,":[102],"final":[104],"set":[105],"20":[107],"primary":[108,119],"was":[110],"selected":[111],"for":[112,154,172],"review.":[114],"Results:":[115],"Results":[116],"show":[117],"that":[118],"are":[121,137,189],"mostly":[122],"published":[123],"security":[125],"venues":[126],"followed":[127],"by":[128],"engineering":[130],"venues.":[131],"Furthermore,":[132],"most":[133,166],"based":[138],"on":[139],"standard":[141],"XACML":[142],"language.":[145],"In":[146],"addition,":[147],"significant":[149],"portion":[150],"automated":[159],"with":[160],"test":[161],"assessment":[162],"generation":[164],"targeted":[167],"areas.":[168],"Some":[169],"general":[170],"guidelines":[171],"leveraging":[173],"developing":[175],"inside":[185],"DevOps":[187],"process":[188],"provided.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-02T13:48:15.688549","created_date":"2025-10-10T00:00:00"}
