{"title":"协议实现安全测试用例研究","authors":"Lei Zhang, Jing An, C. You, Guangxuan Chen","doi":"10.1109/ISCC-C.2013.145","DOIUrl":null,"url":null,"abstract":"As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Security Testing Case Research of Protocol Implementation\",\"authors\":\"Lei Zhang, Jing An, C. You, Guangxuan Chen\",\"doi\":\"10.1109/ISCC-C.2013.145\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.\",\"PeriodicalId\":313511,\"journal\":{\"name\":\"2013 International Conference on Information Science and Cloud Computing Companion\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Information Science and Cloud Computing Companion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC-C.2013.145\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Information Science and Cloud Computing Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC-C.2013.145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Security Testing Case Research of Protocol Implementation
As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.