{"title":"Information Security Protection in Software Testing","authors":"Yubin Wang, Jinyu Yao, Xiaoxue Yu","doi":"10.1109/CIS2018.2018.00106","DOIUrl":null,"url":null,"abstract":"At the present, information security protection for software testing is faced with serious situation. There are risks of software information interaction and transmission throughout the life cycle in software testing process. Lack of information security protection and technical support will result in important information leakage, such as the source code leakage, etc. By analyzing the leakage way of software information, a method in accordance with the information security requirements is elaborated which composed by technology framework, Controlled library, and test data security etc. The method is throughout the life cycle of software testing process in order to ensure the security of software testing.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS2018.2018.00106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
At the present, information security protection for software testing is faced with serious situation. There are risks of software information interaction and transmission throughout the life cycle in software testing process. Lack of information security protection and technical support will result in important information leakage, such as the source code leakage, etc. By analyzing the leakage way of software information, a method in accordance with the information security requirements is elaborated which composed by technology framework, Controlled library, and test data security etc. The method is throughout the life cycle of software testing process in order to ensure the security of software testing.