Quality Test Template toward Multi-user Access Control of Internet-Based System

Автор: Nan Nie, Suzhi Zhang

Журнал: International Journal of Information Engineering and Electronic Business(IJIEEB) @ijieeb

Статья в выпуске: 3 vol.3, 2011 года.

Бесплатный доступ

Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

Internet-based system, access control, test script, template, liability, software quality

Короткий адрес: https://sciup.org/15013089

IDR: 15013089

Список литературы Quality Test Template toward Multi-user Access Control of Internet-Based System

  • Barbara Carminati, Elena Ferrari, “Privacy-Aware Collaborative Access Control in Web-Based Social Networks,” ACM Transactions on Information & System Security, 13(1):pp.6-38, 2009.
  • Hooshmand Alipour, Ayaz Isazadeh, “Software Reliability Prediction Based on a Formal Requirements Specification,” In: Lecture Notes in Computer Science - CSICC 2008 - International Conference, Berlin: Springer, 2008, pp. 816-820.
  • ANSI/IEEE, Standard Glossary of Software Engineering Terminology, STD-729-1991, 1991.
  • Balsamo, S., Di Marco, A., Inverardi, P. ,“Model-based performance prediction in software development A survey,” IEEE Trans Software Engineering 30(5), pp.295–310, 2004.
  • Avritzer, Alberto1; Weyuker, Elaine J., “The role of modeling in the performance testing of e-commerce applications,” IEEE Transactions on Software Engineering, v 30, n 12, pp.1072-1083, December 2004.
  • IBM, IBM Internet Security Systems X-Force® 2008 Trend & Risk Report, 2009.
  • Zhang Nan, Mark D. Ryan, Dimitar P. Guelev, “Synthesising Verified Access Control Systems through Model Checking”, Journal of Computer Security, IOS Press Amsterdam, The Netherlands, 2008, 16(1):pp.1-61.
  • Alipour, H., Isazadeh, A., “Software Reliability Assessment Based on a Formal Requirements Specification” . 2008 International Conference on Human System Interactions, Publisher:IEEE Computer Society, 2008: pp.311–316.
  • C. Del Grosso, G. Antoniol, E. Merlo, P. Galinier, “Detecting buffer overflow via automatic test input data generation”, Computers and Operational Research 35(10) ,pp.3125-3143,2008.
  • Xu, Wuzhi, Offutt, Jeff, Luo, Juan, “Testing Web Services by XML Perturbation”, Source: Proceedings the 16th IEEE International Symposium on Software Reliability Engineering, IEEE Computer Society Washington, DC, USA , 2005, pp. 257-266.
  • Qun Ni, E. BERTINO, “Privacy-aware role-based access control”, ACM Transactions on Information and System Security (TISSEC) , 13(3):pp.24-55, 2010.
  • Nie Nan, Xia Qiming, Yao Junfeng, “Component Interface–Oriented XACML Mutation Testing Policies”,Journal of University of Electronic Science and Technology of China. 2008,38(2):pp.288-292.
  • Delamaro M E ,Maldonado J C , Mat hur A P. “Integration Testing Using Interface Mutations”, proceedings of International Symposium on Software Reliability Engineering (ISSRE’96), : IEEE Computer Society Press, 1996, pp.112-121.
  • E. Martin, Tao. Xie, “A fault model and mutation testing of access control policies” In Proc. 11th International Conference on World Wide Web, ACM New York,2007,667 - 676.
  • T.Illes, A.Herrmann, B. Paech, J. Rückert., “Criteria for Software Testing Tool Evaluation – A Task Oriented View,” Proceedings of the 3rd World Congress for Software Quality 2005, Vol. 2, pp. 213-222.
  • Scully, J.K., “The Role of System Behavior in Diagnostic Performance ,” Northrop Grumman Corp., El Segundo, CA in: Systems Conference, 2008 2nd Annual IEEE Publication Date: 7-10 April 2008 , pp. 1 – 7.
Еще
Статья научная