首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
在前期研究工作的基础上,将基于指数的微观分析和基于风险和的宏观分析相结合,提出了一种综合量化评估主流操作系统安全弱点的方法,并对Windows NT、Redhat Linux和Solaris等3大主流操作系统6个版本的1081个弱点实施了评估.该方法能够有效地分析各操作系统版本的演进对其安全性的影响,以及横向比较操作系统在不同层次、不同方面的安全状况.  相似文献   

2.
操作系统安全增强技术研究进展   总被引:4,自引:0,他引:4  
操作系统安全增强是近年来信息安全的研究热点之一。本文分析和讨论了操作系统安全增强的重点及相应技术,对比和分析了近年来开发的安全增强操作系统,并对未来安全操作系统的发展趋势作出了分析和展望。  相似文献   

3.
    
Software testing is an important and cost intensive activity in software development. The major contribution in cost is due to test case generations. Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure. Requirement-based testing includes functional and nonfunctional requirements. The objective of this study is to explore the approaches that generate test cases from requirements. A systematic literature review based on two research questions and extensive quality assessment criteria includes studies. The study identifies 30 primary studies from 410 studies spanned from 2000 to 2018. The review’s finding shows that 53% of journal papers, 42% of conference papers, and 5% of book chapters’ address requirements-based testing. Most of the studies use UML, activity, and use case diagrams for test case generation from requirements. One of the significant lessons learned is that most software testing errors are traced back to errors in natural language requirements. A substantial amount of work focuses on UML diagrams for test case generations, which cannot capture all the system’s developed attributes. Furthermore, there is a lack of UML-based models that can generate test cases from natural language requirements by refining them in context. Coverage criteria indicate how efficiently the testing has been performed 12.37% of studies use requirements coverage, 20% of studies cover path coverage, and 17% study basic coverage.  相似文献   

4.
    
Testing is an integral part of software development. Current fast-paced system developments have rendered traditional testing techniques obsolete. Therefore, automated testing techniques are needed to adapt to such system developments speed. Model-based testing (MBT) is a technique that uses system models to generate and execute test cases automatically. It was identified that the test data generation (TDG) in many existing model-based test case generation (MB-TCG) approaches were still manual. An automatic and effective TDG can further reduce testing cost while detecting more faults. This study proposes an automated TDG approach in MB-TCG using the extended finite state machine model (EFSM). The proposed approach integrates MBT with combinatorial testing. The information available in an EFSM model and the boundary value analysis strategy are used to automate the domain input classifications which were done manually by the existing approach. The results showed that the proposed approach was able to detect 6.62 percent more faults than the conventional MB-TCG but at the same time generated 43 more tests. The proposed approach effectively detects faults, but a further treatment to the generated tests such as test case prioritization should be done to increase the effectiveness and efficiency of testing.  相似文献   

5.
    
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.  相似文献   

6.
本文分析了铁路信号安全软件测试评估平台的结构,测试案例的生成,运行集的生成以及回归测试。运用测试平台能实现对微机联锁软件的功能测试和安全性测试,提高联锁软件的可靠性安全性。  相似文献   

7.
介绍了塔机安全评估系统的各部分组成,通过现场检测与软件平台相结合的方式,经过研究,提出一种综合评估的方法,该系统的建立,为塔机安全评估的系统化迈出了新的进程。  相似文献   

8.
高性能安全路由器BW7000的设计与实现   总被引:4,自引:0,他引:4  
高性能和安全是计算机网络研究的两个主要问题。路由器在保证转发性能的前提下提供网络安全保护已经成为当前的研究热点。文章介绍了在完成国家\"八六三\"计划重大课题\"高性能安全路由器\"的过程中解决的若干关键技术问题。高性能安全路由器BW7000基于自主设计的高性能路由器操作系统HEROS。为保证高性能的路由转发,设计实现了基于RAM的高性能路由查找算法;为支持服务质量控制和安全管理,设计实现了基于无冲突HashTrie树的分组分类算法和基于反馈的分布式分组调度算法;为保证网络安全,提出了基于分布式密钥管理的路由器安  相似文献   

9.
自由飞行空间机器人地面实验平台硬件系统   总被引:4,自引:1,他引:3  
介绍了双臂自由飞行空间机器人地面实验平台系统。在阐述了整个平台系统组成的基础上,重点介绍了该系统的硬件构成,分别对各个子系统的硬件组成进行了具体论述。  相似文献   

10.
针对在大规模企业分布式网络中快速实施安全评估这一分布式安全评估问题,提出一种面向任务、可重构的主控中心方案.实验验证了该方案在快速任务生成时是可行、有效的,具有以扫描策略为组件、面向任务、可重构特性.  相似文献   

11.
中央控制系统(CCS,Central Control System)是卫星电气地面支持设备(EGSE,Electrical GroundSupport Equipment)的核心,其性能的优劣对卫星的地面测试有重要影响.针对设计的CCS提出了影响其性能的主要技术指标--网络连接响应时间、测试序列执行能力和数据处理能力,提出了CCS性能测试方案,设计了性能测试用例,进行了CCS性能测试并给出了测试结论.结果表明,该CCS具有较好的性能,满足当前卫星地面测试的要求.  相似文献   

12.
    
Availability of a system is a crucial factor for planning and optimization. The concept is more challenging for modern systems such as robots and autonomous systems consisting of a complex configuration of components. In this paper, a reliability evaluation framework is developed for a system of binary state autonomous robots in an automated manufacturing environment. In this framework, the concepts in functional block diagram, table of truth, and sum of state are employed simultaneously to develop a binary state reliability model. Due to inefficacy of the method for larger number of components involved in complex systems, an extension of the Bernoulli trials is proposed. In an implementation study, the effectiveness and computational efficiency of the proposed method are illustrated. In addition, an analysis on the failure rate using the maximum likelihood estimation and confidence interval is reported. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   

13.
本文梳理了企业产品标准自我声明公开和监督相关要求,提出了企业产品标准水平评估指标体系建立原则,分析了企业产品标准相关的法律、法规、规章、规范性文件等政策要求,从合规性、科学性、规范性三个方面建立了企业产品标准水平评估指标体系。  相似文献   

14.
15.
16.
提出了通过分析计算机系统的资源实体、访问者权限、安全需求和弱点等安全属性,按照不同的安全需求构造出安全故障树来直观地反映攻击者可能选取的攻击手段的安全状况评价方法;分析安全故障树,使用潜在攻击路径和系统安全失效概率从定性和定量两个方面表达计算机系统的安全状况,为系统的安全改进提供指导和建议。  相似文献   

17.
    
Over the last decade, a significant increase has been observed in the useof web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, the security of such systemsbecame a crucial aspect to ensure safety, integrity and authenticity of the data.To achieve the objectives of data safety, security testing is performed. However,with growth and diversity of information systems, it is challenging to apply security testing for each and every system. Therefore, it is important to classify theassets based on their required level of security using an appropriate technique.In this paper, we propose an asset security classification technique to classifythe System Under Test (SUT) based on various factors such as system exposure,data criticality and security requirements. We perform an extensive evaluation ofour technique on a sample of 451 information systems. Further, we use securitytesting on a sample extracted from the resulting prioritized systems to investigatethe presence of vulnerabilities. Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments andalso found several vulnerabilities in them.  相似文献   

18.
案例反思在概念生成中的设计固化效应研究   总被引:5,自引:5,他引:0       下载免费PDF全文
袁翔  何人可 《包装工程》2015,36(6):92-96
目的探讨如何减少案例反思在概念生成中的设计固化效应。方法基于\"反思-实践\"循环组织实验进行实证研究。结论与设计问题密切相关的参考案例能显著驱动设计者的反思活动,促使其设计构思更加激进。这种激进的设计构思可能导致设计固化,但若设计者运用高级反思策略,设计固化就不会出现。  相似文献   

19.
为了研究自由飞行机器人的运动学和动力学特性,开发了可以在地面上模拟空间微重力环境并能自主捕捉目标的双臂自由飞行空间机器地面实验平台仿真系统。介绍了整个系统的组成,讨论了系统所采用的规划器,主要介绍了规划器采用的控制策略和规划算法,最后用计算机仿真验证了规划器的正确性。  相似文献   

20.
In daily life, we are all used to frequent ‘systems’: public transports, industrial parks, shopping areas, stadiums or many others. And with the exponential increase of technologies, we are now living in a kind of ‘open World’ within which goods, persons or information are moving increasingly faster. The consequence is an amazing new way of life and also a number of new threats for our society. To insure the security of all citizens, and also of infrastructures, national skills or anything else, we need to secure our systems efficiently. To do so, we need appropriate tools to accurately analyze vulnerabilities in order to counter all kinds of malevolence. After giving an overview of different methods linked to that problem, we will explain our process to analyze the vulnerabilities of a complex infrastructure and what points are fundamental to take into account facing human aggressions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号