Title :
The Security Testing Case Research of Protocol Implementation
Author :
Lei Zhang ; Jing An ; Chunlan You ; Guangxuan Chen
Author_Institution :
Logistics Acad., Beijing, China
Abstract :
As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.
Keywords :
program testing; security of data; data storage; data transmission; information system; security protection technology; security protocol; security testing; test case description; test case generation; test sequence generation; Abstracts; Automata; Electronic mail; Protocols; Security; Standards; Testing; protocol implementation; security testing; test cases;
Conference_Titel :
Information Science and Cloud Computing Companion (ISCC-C), 2013 International Conference on
Conference_Location :
Guangzhou
DOI :
10.1109/ISCC-C.2013.145