Search Results - "Kuhn, D.R."
-
1
Software fault interactions and implications for software testing
Published in IEEE transactions on software engineering (01-06-2004)“…Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively…”
Get full text
Journal Article -
2
Sources of failure in the public switched telephone network
Published in Computer (Long Beach, Calif.) (01-04-1997)“…What makes a distributed system reliable? A study of failures in the US public switched telephone network (PSTN) shows that human intervention is one key to…”
Get full text
Journal Article -
3
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
Published in IEEE journal on selected areas in communications (01-10-2006)“…We present a detailed study of the potential impact of border gateway protocol peering session attacks and the resulting exploitation of route flap damping…”
Get full text
Journal Article -
4
IPOG: A General Strategy for T-Way Software Testing
Published in 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07) (01-03-2007)“…Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters…”
Get full text
Conference Proceeding -
5
An investigation of the applicability of design of experiments to software testing
Published in 27th Annual NASA Goddard/IEEE Software Engineering Workshop, 2002. Proceedings (2002)“…Approaches to software testing based on methods from the field of design of experiments have been advocated as a means of providing high coverage at relatively…”
Get full text
Conference Proceeding -
6
Challenges in securing voice over IP
Published in IEEE security & privacy (01-05-2005)“…Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of…”
Get full text
Magazine Article -
7
Evolving directions in formal methods
Published in Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance (1997)“…Formal methods have demonstrated their effectiveness in a number of application areas, but are still not widely used in the computing industry. Advances in…”
Get full text
Conference Proceeding -
8
Property Verification for Generic Access Control Models
Published in 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2008)“…To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather…”
Get full text
Conference Proceeding -
9
Toward credible IT testing and certification
Published in IEEE software (01-07-1999)“…Accessible, rigorous measurement and test methods are key to creating quality software and increasing IT market competition. At the US National Institute of…”
Get full text
Journal Article -
10
The computational complexity of enforceability validation for generic access control rules
Published in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06) (2006)“…In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies…”
Get full text
Conference Proceeding -
11
Formal specification and verification of control software for cryptographic equipment
Published in [1990] Proceedings of the Sixth Annual Computer Security Applications Conference (1990)“…A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token'…”
Get full text
Conference Proceeding -
12
On the effective use of software standards in systems integration
Published in Systems Integration '90. Proceedings of the First International Conference on Systems Integration (1990)“…A set of standards for an open systems environment is presented, and an approach to the use of these standards in systems integration is defined. In…”
Get full text
Conference Proceeding -
13
Lessons from 342 medical device failures
Published in Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering (1999)“…Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and…”
Get full text
Conference Proceeding -
14
An analysis of selected software safety standards
Published in COMPASS `92 Proceedings of the Seventh Annual Conference on Computer Assurance (1992)“…This study examines standards, draft standards, and guidelines that provide requirements for the assurance of high-integrity software. It focuses on…”
Get full text
Conference Proceeding -
15
IEEE's Posix: making progress
Published in IEEE spectrum (01-12-1991)“…The status of the interface standards within the IEEE Portable Operating System Interface (Posix) environment (the x in Posix denotes the Unix operating system…”
Get full text
Magazine Article -
16
An analysis of selected software safety standards
Published in IEEE aerospace and electronic systems magazine (01-08-1992)“…Standards, draft standards, and guidelines that provide requirements for the assurance of high integrity software are studied. The focus is on identifying the…”
Get full text
Magazine Article