Search Results - "Kuhn, D.R."

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Software fault interactions and implications for software testing by Kuhn, D.R., Wallace, D.R., Gallo, A.M.

    Published in IEEE transactions on software engineering (01-06-2004)
    “…Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively…”
    Get full text
    Journal Article
  2. 2

    Sources of failure in the public switched telephone network by Kuhn, D.R.

    Published in Computer (Long Beach, Calif.) (01-04-1997)
    “…What makes a distributed system reliable? A study of failures in the US public switched telephone network (PSTN) shows that human intervention is one key to…”
    Get full text
    Journal Article
  3. 3

    Study of BGP Peering Session Attacks and Their Impacts on Routing Performance by Sriram, K., Montgomery, D., Borchert, O., Okhee Kim, Kuhn, D.R.

    “…We present a detailed study of the potential impact of border gateway protocol peering session attacks and the resulting exploitation of route flap damping…”
    Get full text
    Journal Article
  4. 4

    IPOG: A General Strategy for T-Way Software Testing by Yu Lei, Kacker, R., Kuhn, D.R., Okun, V., Lawrence, J.

    “…Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters…”
    Get full text
    Conference Proceeding
  5. 5

    An investigation of the applicability of design of experiments to software testing by Kuhn, D.R., Reilly, M.J.

    “…Approaches to software testing based on methods from the field of design of experiments have been advocated as a means of providing high coverage at relatively…”
    Get full text
    Conference Proceeding
  6. 6

    Challenges in securing voice over IP by Walsh, T.J., Kuhn, D.R.

    Published in IEEE security & privacy (01-05-2005)
    “…Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of…”
    Get full text
    Magazine Article
  7. 7

    Evolving directions in formal methods by Kuhn, D.R.

    “…Formal methods have demonstrated their effectiveness in a number of application areas, but are still not widely used in the computing industry. Advances in…”
    Get full text
    Conference Proceeding
  8. 8

    Property Verification for Generic Access Control Models by Hu, V.C., Kuhn, D.R., Tao Xie

    “…To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather…”
    Get full text
    Conference Proceeding
  9. 9

    Toward credible IT testing and certification by Wakid, S.A., Kuhn, D.R., Wallace, D.R.

    Published in IEEE software (01-07-1999)
    “…Accessible, rigorous measurement and test methods are key to creating quality software and increasing IT market competition. At the US National Institute of…”
    Get full text
    Journal Article
  10. 10

    The computational complexity of enforceability validation for generic access control rules by Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.

    “…In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies…”
    Get full text
    Conference Proceeding
  11. 11

    Formal specification and verification of control software for cryptographic equipment by Kuhn, D.R., Dray, J.F.

    “…A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token'…”
    Get full text
    Conference Proceeding
  12. 12

    On the effective use of software standards in systems integration by Kuhn, D.R.

    “…A set of standards for an open systems environment is presented, and an approach to the use of these standards in systems integration is defined. In…”
    Get full text
    Conference Proceeding
  13. 13

    Lessons from 342 medical device failures by Wallace, D.R., Kuhn, D.R.

    “…Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and…”
    Get full text
    Conference Proceeding
  14. 14

    An analysis of selected software safety standards by Wallace, D.R., Kuhn, D.R., Ippolito, L.M.

    “…This study examines standards, draft standards, and guidelines that provide requirements for the assurance of high-integrity software. It focuses on…”
    Get full text
    Conference Proceeding
  15. 15

    IEEE's Posix: making progress by Kuhn, D.R.

    Published in IEEE spectrum (01-12-1991)
    “…The status of the interface standards within the IEEE Portable Operating System Interface (Posix) environment (the x in Posix denotes the Unix operating system…”
    Get full text
    Magazine Article
  16. 16

    An analysis of selected software safety standards by Wallace, D.R., Kuhn, D.R., Ippolito, L.M.

    “…Standards, draft standards, and guidelines that provide requirements for the assurance of high integrity software are studied. The focus is on identifying the…”
    Get full text
    Magazine Article