Learn More
We present the tool TAXI which implements the XML-based Partition Testing approach for the automated generation of XML Instances conforming to a given XML Schema. In addition it provides a set of weighted test strategies to guide the systematic derivation of instances. TAXI can be used for black-box testing of applications accepting in input XML instances(More)
We present the XML-based Partition Testing (XPT) approach for the automatic generation of XML instances from a XML Schema. The approach is inspired by the well-known Category Partition method for black-box testing. The generated instances can be used for inter-operability testing of applications that expect in input conforming XML instances, as well as for(More)
We introduce the XPT approach for the automated systematic generation of XML instances which conform to a given XML Schema, and its implementation into the proof-of-concept tool TAXI. XPT can be used to automatize the black-box testing of any general application that expects in input the XML instances. We generate a comprehensive set of instances by(More)
With XML and XML Schema widely acknowledged as the de facto standard for data exchange and interop-erability between remote applications, the need for checking integrity and adequacy of XML documents, also by means of automated tools, increases. In this perspective, this paper addresses two objectives: we provide a classification and a short overview of the(More)
We present an ongoing experience in the application of UML based testing methodology in an e-Learning environment. In particular, we focus on the interaction of learning objects and Learning Management Systems (LMS). This paper reports the application of the proposed technology for test case generation considering the SCORM specifications as the reference(More)
Model-based testing is nowadays the emerging paradigm for software testing in many domains. In the Web arena XML Schema is becoming the technology of reference to describe data structure and applications input domains. The proposed tool (TAXI-Testing by Automatically generated XML Instances) exploits such a model to automatically derive correct XML(More)
In the field of network security, vulnerability evaluation is a very important method to assess the attack and defense means in many practical use, such as penetration testing and safety pre-warning. Up to now, there are a lot of vulnerability evaluate methods, such as CWE, CVSS, and there are a lot of basic evaluate methods for further improvement and(More)
Acknowledgments I would like to express my gratitude to all those who helped me during the writing of this thesis. Without their encouragement and assistance, this thesis would not have been completed. My deepest gratitude goes first and foremost to Antonia Bertolino, my supervisor. She gave me much inspiration and encouragement during my academic studies.(More)
Computer Network Defense Policy is a kind of policy-based network management method which aims to achieve specific security objectives. Although it brings much efficiency in the field of computer network defense, it can't be widely used because the existing Computer Network Defense Policy models are all proposed on P2DRR architecture and lack specific(More)
  • 1