INFORMATION CHANGE THE WORLD

International Journal of Information Engineering and Electronic Business(IJIEEB)

ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)

Published By: MECS Press

IJIEEB Vol.3, No.3, Jun. 2011

Quality Test Template toward Multi-user Access Control of Internet-Based System

Full Text (PDF, 438KB), PP.30-36


Views:72   Downloads:2

Author(s)

Nan Nie,Suzhi Zhang

Index Terms

Internet-based system,access control,test script,template,liability,software quality

Abstract

Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

Cite This Paper

Nan Nie,Suzhi Zhang,"Quality Test Template toward Multi-user Access Control of Internet-Based System", IJIEEB, vol.3, no.3, pp.30-36, 2011.

Reference

[1]Barbara Carminati, Elena Ferrari, “Privacy-Aware Collaborative Access Control in Web-Based Social Networks,” ACM Transactions on Information & System Security, 13(1):pp.6-38, 2009.

[2]Hooshmand Alipour, Ayaz Isazadeh, “Software Reliability Prediction Based on a Formal Requirements Specification,” In: Lecture Notes in Computer Science - CSICC 2008 - International Conference, Berlin: Springer, 2008, pp. 816-820.

[3]ANSI/IEEE, Standard Glossary of Software Engineering Terminology, STD-729-1991, 1991.

[4]Balsamo, S., Di Marco, A., Inverardi, P. ,“Model-based performance prediction in software development A survey,” IEEE Trans Software Engineering 30(5), pp.295–310, 2004.

[5]Avritzer, Alberto1; Weyuker, Elaine J., “The role of modeling in the performance testing of e-commerce applications,” IEEE Transactions on Software Engineering, v 30, n 12, pp.1072-1083, December 2004.

[6]IBM, IBM Internet Security Systems X-Force® 2008 Trend & Risk Report, 2009.

[7]Zhang Nan, Mark D. Ryan, Dimitar P. Guelev, “Synthesising Verified Access Control Systems through Model Checking”, Journal of Computer Security, IOS Press Amsterdam, The Netherlands, 2008, 16(1):pp.1-61.

[8]Alipour, H., Isazadeh, A., “Software Reliability Assessment Based on a Formal Requirements Specification” . 2008 International Conference on Human System Interactions, Publisher:IEEE Computer Society, 2008: pp.311–316.

[9]C. Del Grosso, G. Antoniol, E. Merlo, P. Galinier, “Detecting buffer overflow via automatic test input data generation”, Computers and Operational Research 35(10) ,pp.3125-3143,2008.

[10]Xu, Wuzhi, Offutt, Jeff, Luo, Juan, “Testing Web Services by XML Perturbation”, Source: Proceedings the 16th IEEE International Symposium on Software Reliability Engineering, IEEE Computer Society Washington, DC, USA , 2005, pp. 257-266.

[11]Qun Ni, E. BERTINO, “Privacy-aware role-based access control”, ACM Transactions on Information and System Security (TISSEC) , 13(3):pp.24-55, 2010.

[12]Nie Nan, Xia Qiming, Yao Junfeng, “Component Interface–Oriented XACML Mutation Testing Policies”,Journal of University of Electronic Science and Technology of China. 2008,38(2):pp.288-292.

[13]Delamaro M E ,Maldonado J C , Mat hur A P. “Integration Testing Using Interface Mutations”, proceedings of International Symposium on Software Reliability Engineering (ISSRE’96), : IEEE Computer Society Press, 1996, pp.112-121.

[14]E. Martin, Tao. Xie, “A fault model and mutation testing of access control policies” In Proc. 11th International Conference on World Wide Web, ACM New York,2007,667 - 676.

[15]T.Illes, A.Herrmann, B. Paech, J. Rückert., “Criteria for Software Testing Tool Evaluation – A Task Oriented View,” Proceedings of the 3rd World Congress for Software Quality 2005, Vol. 2, pp. 213-222.

[16]Scully, J.K., “The Role of System Behavior in Diagnostic Performance ,” Northrop Grumman Corp., El Segundo, CA in: Systems Conference, 2008 2nd Annual IEEE Publication Date: 7-10 April 2008 , pp. 1 – 7.