期刊文献+

Comparison of SETAM with Security Use Case and Security Misuse Case:A Software Security Testing Study

Comparison of SETAM with Security Use Case and Security Misuse Case:A Software Security Testing Study
原文传递
导出
摘要 A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87% use cases on average,and the number of faults detected by SETAM increased by 71.67% in average,which means that our model can detect more faults with fewer test cases for software security testing. A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87% use cases on average,and the number of faults detected by SETAM increased by 71.67% in average,which means that our model can detect more faults with fewer test cases for software security testing.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期516-520,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z402) the PLA University of Science and Technology Pre-research Project (20110202, 20110210) the Natural Science Foundation of Jiangsu Province of China (BK2012059,BK2012060) the PLAUST Outstanding Graduate Student Thesis Fund (2012)
关键词 security testing security use case security misuse case software security testing behavior model security testing requirement security testing security use case security misuse case software security testing behavior model security testing requirement
  • 相关文献

参考文献18

  • 1ISO/IEC JTC1. ISO/IEC 9126-1. Information Technology- Software Quality Characteristics and Metrics-Part 1: Quality Model [S]. Geneva: IEC Press, 2008.
  • 2McGraw G. Softvare security [J]. IEEE Security and Privacy, 2004, 2(2): 80-83.
  • 3Potter B, McGraw G. Software security testing [J]. IEEE Security and Privacy Magazine, 2004, 2(5): 81-85.
  • 4CNCERT. CC[EB/OL]. [2011-06-23] http://www.cert.org, on. Firsmith D G. Security use cases[J]. Journal of Object Technology, 2003, 2(3): 53-64.
  • 5Haley C B, Laney R, Moffett J D, et al. Security requirements engineering: A framework for representation and analysis [J]. IEEE Transaction on Software Engineering, 2008, 34(1): 133-153.
  • 6Hui Z W, Huang S, Ren Z P, et al. Review of software security defects taxonomy[J]. Rough Set and Knowledge Technology (LNCS), 2010, 6401: 310-321.
  • 7Hui Z W, Huang S. Software security testing of web applications based on SSD[J]. Communications in Computer and Information Science, 2010, 93: 527-534.
  • 8Alexander Ian. Misuse case help to elicit nonfimctional requirements, lEE CCEJ. [EB/OL]. [2011-05-21 ]. http://easyweb.easynet, co. uk /~iany/eonsultancy/papers.htm.
  • 9Sindre G, Opdahl A L. Templates for misuse case description. [EB/OL]. [2011-04-12]. http://www.ifi.uib.no/conf/refsq2001 /papers/p 2 5.pdf.
  • 10Sindre G, Opdahl A L. Templates for misuse case description. [EB/OL]. [2011-04-12]. http://www.ifi.uib.no/conf/refsq2001 /papers/p25.pdf.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部