NIST logo

Publications Portal

You searched on:
Author: david kuhn
Sorted by: title

Displaying records 1 to 10 of 88 records.
Resort by: Date / Title


1. A Combinatorial Approach to Building Navigation Graphs for Dynamic Web Applications
Published: 9/20/2009
Authors: Raghu N Kacker, David R Kuhn, James F Lawrence, Wenhua Wang, Yu Lei, Sreedevi Sampath
Abstract: Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt with: (1) the page explosion problem, i.e., the number of dynamic pages m ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902865

2. A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
Published: 6/14/2011
Authors: Raghu N Kacker, Yu Lei, David R Kuhn, Wenhua Wang
Abstract: Buffer overflow vulnerabilities are program defects that can cause a buffer overflow to occur at runtime. Many security attacks exploit buffer overflow vulnerabilities to compromise critical data structures. In this paper, we present a black-box test ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905210

3. A General Conformance Testing Framework for IEEE 11073 PHD's Communication Model
Published: 5/31/2013
Authors: Raghu N Kacker, Linbin Yu, Yu Lei, David R Kuhn, Ram D Sriram, Kevin G Brady
Abstract: ISO/IEEE 11073 Personal Health Data (IEEE 11073 PHD) is a set of standards that addresses the interoperability of personal healthcare devices. As an important part of IEEE 11073 PHD, ISO/IEEE 1107-20601 optimized exchange protocol (IEEE 11073-20601) ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913823

4. A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
Report Number: 6741
Published: 6/13/2001
Author: David R Kuhn
Abstract: This paper presents a hybrid cryptographic protocol, using quantum and classical resources, for authentication and authorization in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151242

5. A Survey of Binary Covering Arrays
Published: 4/7/2011
Authors: James F Lawrence, Raghu N Kacker, David R Kuhn, Michael Forbes
Abstract: Two-valued covering arrays of strength t are 0--1 matrices having the property that for each t columns and each of the possible 2t sequences of t 0's and 1's, there exists a row having that sequence in that set of t columns. Covering arrays are an im ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51256

6. Adding Attributes to Role Based Access Control
Published: 6/1/2010
Authors: David R Kuhn, Edward Coyne, Timothy Weil
Abstract: Role based access control [1][2] (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905425

7. An Algorithm for Generating Very Large Covering Arrays
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7308
Published: 4/19/2006
Author: David R Kuhn
Abstract: This note describes a covering array algorithm that can be parallelized, making it possible to handle a much larger number of variables than other know algorithms. The algorithm trades test case optimization for speed ? it produces roughly 3% to 15% ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150637

8. An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7773
Published: 11/1/2010
Authors: Carmelo Montanez-Rivera, David R Kuhn, Mary C Brady, Richard M Rivello, Jenise Reyes Rodriguez, Michael K. Powers
Abstract: This report describes the use of combinatorial test methods to reduce the cost of testing for the Document Object Model Events standard while maintaining an equivalent level of assurance. More than 36,000 tests - all possible combinations of equival ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907846

9. An Empirical Comparison of Combinatorial and Random Testing
Published: 4/1/2014
Authors: Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N Kacker, David R Kuhn
Abstract: Abstract- Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915439

10. An Input Space Modeling Methodology for Combinatorial Testing
Published: 3/20/2013
Authors: David R Kuhn, Raghu N Kacker
Abstract: The input space of a system must be modeled before combinatorial testing can be applied to this system. The effectiveness of combinatorial testing to a large extent depends on the quality of the input space model. In this paper we introduce an input ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913205



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series