Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 51 - 75 of 196

Combinatorial Coverage Measurement

October 26, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing applies factor covering arrays to test all t-way combinations of input or configuration state space. In some testing situations, it is not practical to use covering arrays, but any set of tests covers at least some portion of t-way

Efficient Algorithms for T-way Test Sequence Generation

October 16, 2012
Author(s)
Linbin Yu, Yu Lei, Raghu N. Kacker, D. Richard Kuhn, James F. Lawrence
Combinatorial testing has been shown to be a very effective testing strategy. Most work on combinatorial testing focuses on t-way test data generation, where each test is an unordered set of parameter values. In this paper, we study the problem of t-way

Factory Equipment Network Testing Framework: Concept, Requirements, and Architecture

September 17, 2012
Author(s)
James D. Gilsinn, Kang B. Lee, John L. Michaloski, Frederick M. Proctor, Yuyin Song
This document describes the purpose, concept, requirements, and architecture for the Factory Equipment Network Testing (FENT) Framework and the software to test equipment on real-time factory networks. Other documents contain more detailed information

Measuring Combinatorial Coverage of System State-space for IV&V

September 13, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker
This report describes some measures of combinatorial coverage that can be helpful in estimating this risk that we have applied to tests for spacecraft software but have general application to any combinatorial coverage problem. This method will be

Efficient Methods for Interoperability Testing Using Event Sequences

July 31, 2012
Author(s)
David R. Kuhn, James M. Higdon, J .M. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication

Testing Environments for Assessing Conformance and Interoperability

July 12, 2012
Author(s)
Robert D. Snelick, Leonard E. Gebase
We present a classification framework of testing environments that support conformance and interoperability testing of distributed systems. We describe each testing environment and state the applicability and requirements placed on a realization of a

Combinatorial Testing

June 25, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest

Evaluation of Fault Detection Effectiveness for Combinatorial and Exhaustive Selection of Discretized Test Inputs

June 4, 2012
Author(s)
Carmelo Montanez-Rivera, David R. Kuhn, Mary C. Brady, Richard M. Rivello, Jenise Reyes Rodriguez, Michael K. Powers
Testing components of web browsers and other graphical interface software can be extremely expensive because of the need for human review of screen appearance and interactive behavior. Combinatorial testing has been advocated as a method that provides

Combinatorial Methods for Event Sequence Testing

April 21, 2012
Author(s)
D. Richard Kuhn, James M. Higdon, James F. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences. This paper presents an application of combinatorial methods to testing problems for which it is important to test multiple configurations, but also to test the order in which events occur. For example, the

Vulnerability Hierarchies in Access Control Configurations

December 27, 2011
Author(s)
David R. Kuhn
This paper applies methods for analyzing fault hierarchies to the analysis of relationships among vulnerabilities in misconfigured access control rule structures. Hierarchies have been discovered previously for faults in arbitrary logic formulae, such that

Role Engineering: Methods and Standards

December 8, 2011
Author(s)
Edward Coyne, Timothy Weil, D. Richard Kuhn
This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role

NIST Handbook 150-31, NVLAP Healthcare Information Technology Testing

November 28, 2011
Author(s)
Dana S. Leaman, Lawrence I. Knab
NIST Handbook 150-31 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Healthcare Information Technology Testing program. It is intended for

Ten years of computer forensic tool testing

October 12, 2011
Author(s)
James R. Lyle, Barbara Guttman, Richard Ayers
The Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) has been active since 2000. The project develops methodologies for testing computer forensic software tools by the creation of general tool

Source Code Security Analysis Tool Test Plan

October 4, 2011
Author(s)
Hsiao-Ming M. Koo, Romain Gaucher, Charline Cleraux, Jenise Reyes Rodriguez
This document provides a set of metrics, including test suites and methods, to determine how well a particular source code security analysis tool conforms to the requirements specified in Source Code Security Analysis Tool Functional Specification Version

ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions

September 16, 2011
Author(s)
Christofer J. McGinnis, Dylan J. Yaga, Fernando L. Podio
The current version of the ANSI/NIST-ITL standard "Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information" is specified in two parts. Part 1, ANSI/NIST-ITL 1-2007, specifies the traditional format, and Part 2, ANSI/NIST-ITL 2

An IEEE 1588 Performance Testing Dashboard for Power Industry Requirements

September 12, 2011
Author(s)
Julien M. Amelot, Ya-Shian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry's accuracy, reliability and

Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007

June 22, 2011
Author(s)
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
The Computer Security Division of NIST/ITL supports the development of biometric conformance testing methodology standards and other conformity assessment efforts through active technical participation in the development of these standards and the

Computer Security Division 2010 Annual Report

May 31, 2011
Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.

National Checklist Program for IT Products Guidelines for Checklist Users and Developers

February 25, 2011
Author(s)
Stephen D. Quinn, Murugiah P. Souppaya, Melanie Cook, Karen Scarfone
Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Program

An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events

November 1, 2010
Author(s)
Carmelo Montanez-Rivera, D. Richard Kuhn, Mary C. Brady, Richard M. Rivello, Jenise Reyes Rodriguez, Michael K. Powers
This report describes the use of combinatorial test methods to reduce the cost of testing for the Document Object Model Events standard while maintaining an equivalent level of assurance. More than 36,000 tests - all possible combinations of equivalence

An IEEE 1588 Time Synchronization Testbed for Assessing Power Distribution Requirements

October 25, 2010
Author(s)
Julien M. Amelot, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, Ya-Shian Li-Baboud, James Moyne
Wide-area monitoring applications for power distribution rely on accurate global time synchronization. Furthermore, there is interest in replacing current time synchronization methods such as IRIG, with distributed time synchronization protocols that

Maintainers Manual for Version 2.2.1 of the NIST DMIS Test Suite

October 25, 2010
Author(s)
Thomas R. Kramer, John A. Horst
This manual is a maintainers manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual is
Was this page helpful?