Learn More
We present the XML-based Partition Testing (XPT) approach for the automatic generation of XML instances from a XML Schema. The approach is inspired by the well-known Category Partition method for black-box testing. The generated instances can be used for inter-operability testing of applications that expect in input conforming XML instances, as well as for(More)
We present the tool TAXI which implements the XML-based Partition Testing approach for the automated generation of XML Instances conforming to a given XML Schema. In addition it provides a set of weighted test strategies to guide the systematic derivation of instances. TAXI can be used for black-box testing of applications accepting in input XML instances(More)
We introduce the XPT approach for the automated systematic generation of XML instances which conform to a given XML Schema, and its implementation into the proof-of-concept tool TAXI. XPT can be used to automatize the black-box testing of any general application that expects in input the XML instances. We generate a comprehensive set of instances by(More)
With XML and XML Schema widely acknowledged as the de facto standard for data exchange and interoperability between remote applications, the need for checking integrity and adequacy of XML documents, also by means of automated tools, increases. In this perspective, this paper addresses two objectives: we provide a classification and a short overview of the(More)
We present an ongoing experience in the application of UML based testing methodology in an e-Learning environment. In particular, we focus on the interaction of learning objects and Learning Management Systems (LMS). This paper reports the application of the proposed technology for test case generation considering the SCORM specifications as the reference(More)
In the field of network security, vulnerability evaluation is a very important method to assess the attack and defense means in many practical use, such as penetration testing and safety pre-warning. Up to now, there are a lot of vulnerability evaluate methods, such as CWE, CVSS, and there are a lot of basic evaluate methods for further improvement and(More)
Computer Network Defense Policy is a kind of policy-based network management method which aims to achieve specific security objectives. Although it brings much efficiency in the field of computer network defense, it can't be widely used because the existing Computer Network Defense Policy models are all proposed on P2DRR architecture and lack specific(More)
  • 1