Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: D. Richard Kuhn (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 76 - 100 of 181

Constraint Handling In Combinatorial Test Generation Using Forbidden Tuples

April 13, 2015
Author(s)
Raghu N. Kacker, David R. Kuhn, Yu Lei
Constraint handling is a challenging problem in combinatorial test generation. In general, there are two ways to handle constraints, i.e., constraint solving and forbidden tuples. In our early work we proposed a constraint handling approach based on

Improving IPOG’s Vertical Growth Based on a Graph Coloring Scheme

April 13, 2015
Author(s)
Raghu N. Kacker, David R. Kuhn, Yu Lei
In this paper, we show that the vertical growth phase of IPOG is optimal for t-way test generation when t = 2, but it is no longer optimal when t is greater than 2. We present an improvement that reduces the number of tests generated during vertical growth

Combinatorial Coverage as an Aspect of Test Quality

March 31, 2015
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
There are relatively few good methods for evaluating test set quality, after ensuring basic requirements traceability. Structural coverage, mutation testing, and related methods can be used if source code is available, but these approaches may entail

IT Security

February 4, 2015
Author(s)
Morris Chang, D. Richard Kuhn, Timothy Weil
How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [guest

An Access Control Scheme for Big Data Processing

November 11, 2014
Author(s)
Chung Tong Hu, Timothy Grance, David F. Ferraiolo, David R. Kuhn
Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of

An Empirical Comparison of Combinatorial and Random Testing

April 4, 2014
Author(s)
Raghu N. Kacker, David R. Kuhn
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the

An Empirical Comparison of Combinatorial and Random Testing

April 1, 2014
Author(s)
Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N. Kacker, D. Richard Kuhn
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the

Estimating Fault Detection Effectiveness

April 1, 2014
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
[Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test program

IT Risks

February 3, 2014
Author(s)
Linda Wilbanks, D. Richard Kuhn, Wes Chou
Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some areas of

Guide to Attribute Based Access Control (ABAC) Definition and Considerations

January 16, 2014
Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone
This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the

CCM: A Tool for Measuring Combinatorial Coverage of System State Space

October 10, 2013
Author(s)
Itzel Dominguez, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
This poster presents some measures of combinatorial coverage that can be helpful in estimating residual risk related to insufficient testing of rare interactions, and a tool for computing these measures.

Combinatorial Methods in Testing

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 1 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Combinatorial Testing Applied

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 2 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Evolution From Design of Experiments

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 14 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the

Measuring Combinatorial Coverage

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 7 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

A General Conformance Testing Framework for IEEE 11073 PHD's Communication Model

May 31, 2013
Author(s)
Raghu N. Kacker, Linbin Yu, Yu Lei, David R. Kuhn, Ram D. Sriram, Kevin G. Brady
ISO/IEEE 11073 Personal Health Data (IEEE 11073 PHD) is a set of standards that addresses the interoperability of personal healthcare devices. As an important part of IEEE 11073 PHD, ISO/IEEE 1107-20601 optimized exchange protocol (IEEE 11073-20601)

An Input Space Modeling Methodology for Combinatorial Testing

March 22, 2013
Author(s)
Mehra N. Borazjany, Laleh Ghandehari, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
The input space of a system must be modeled before combinatorial testing can be applied to this system. The effectiveness of combinatorial testing to a large extent depends on the quality of the input space model. In this paper we introduce an input space

Applying Combinatorial Testing to the Siemens Suite

March 22, 2013
Author(s)
Laleh Ghandehari, Mehra N. Borazjany, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
Combinatorial testing has attracted a lot of attention from both industry and academia. A number of reports suggest that combinatorial testing can be effective for practical applications. However, there still seems to lack systematic, controlled studies on

Combinatorial Coverage Measurement Concepts and Applications

March 22, 2013
Author(s)
David R. Kuhn, Itzel (. Dominquez Mendoza, Raghu N. Kacker, Yu Lei
Empirical data demonstrate the value of t-way coverage, but in some testing situations, it is not practical to use covering arrays. However any set of tests covers at least some proportion of t-way combinations. This paper describes a variety of measures

Protecting Wireless Local Area Networks

December 3, 2012
Author(s)
Shirley M. Radack, David R. Kuhn
This article summarizes the information that was presented in the February 2012 Information Technology Laboratory (ITL) bulletin, Guidelines for Securing Wireless Local Area Networks (WLANs). The bulletin, which was noted by WERB in February 2012, was

Combinatorial Coverage Measurement

October 26, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing applies factor covering arrays to test all t-way combinations of input or configuration state space. In some testing situations, it is not practical to use covering arrays, but any set of tests covers at least some portion of t-way