Test example generation method of safety data base management system

A test case generation and management system technology, applied in the direction of software testing/debugging, program control devices, etc., can solve problems such as difficult to find problems, lack of pertinence and dependence of test cases

Inactive Publication Date: 2006-03-29
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the direct application of the above methods in the test and evaluation of SDBMS systems will lead to some special problems: the above-mentioned formal functional specification rewriting rules (or heuristics) are purely related to syntax and have nothing to do with semantics, so the generated tes...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test example generation method of safety data base management system
  • Test example generation method of safety data base management system
  • Test example generation method of safety data base management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] Taking the LOIS security database management system developed by the State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences as an example, the test case generation method for the security database management system provided by the present invention will be described in detail below.

[0099] There are two modes of autonomous authorization related operations in the SDBMS model of the system: one is to authorize users directly, and the other is to authorize roles first, and then activate roles by users. The direct authorization operation GrantPermToUser is an administrative operation that requires the existence of an authorized user who has not been granted this permission. It depends on multiple operations, such as creating a user, creating a security label, creating a data object, connecting, etc. Before performing a test for this operation, you should ensure that you have performed a test for the above operation. And any type ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a systematic operable method for generating safety data base management system test application example. Said method includes the following several steps: (1) generating test protocol; (2) generating test template; (3) type partition; and (4) generating test vector. Said invention also provides the concrete requirements of every step.

Description

technical field [0001] The invention belongs to the field of testing and evaluation of computer software, and mainly relates to the testing and evaluation of a secure database management system (SecureDataBase Management System, referred to as SDBMS), more precisely, the generation of test cases for a high-security secure database management system based on the SDBMS security strategy model method. Background technique [0002] Software testing is an effective means to check the consistency between software implementation and its functional specifications, and to ensure software quality. In the process of evaluating information security products based on security evaluation standards, it is an indispensable and important link in the evaluation that the evaluator conducts comprehensive and systematic third-party testing of the security functions of the security system. However, due to many reasons, the independent security function test does not occupy an important position ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36G06F9/44
Inventor 张敏冯登国徐震吕双双陈驰黄亮
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products