2011 Fourth IEEE International Conference on Software Testing, Verification and Validation 2011
DOI: 10.1109/icst.2011.23
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Based Security Testing in Cloud Computing Environments

Abstract: Assuring the security of a software system in terms of testing nowadays still is a quite tricky task to conduct. Security requirements are taken as a foundation to derive tests to be executed against a system under test. Yet, these positive requirements by far do not cover all the relevant security aspects to be considered. Hence, especially in the event of security testing, negative requirements, derived from risk analysis, are vital to be incorporated. If considering today's emerging trend in the adoption of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 7 publications
0
25
0
Order By: Relevance
“…Each test case is prioritized on the basis of the product of risk exposure value manually determined by domain experts and the correlation between test cases and risks determined by mutation analysis. The effectiveness is shown by comparing the number and severity of faults detected to the approach of Chen et al 09 Zech [24] The approach is model-based and derives a risk model from a system model and a vulnerability knowledge base. On this basis a misuse case model is derived and test code generated from this model is executed.…”
Section: Risk-based Testing Approachesmentioning
confidence: 99%
“…Each test case is prioritized on the basis of the product of risk exposure value manually determined by domain experts and the correlation between test cases and risks determined by mutation analysis. The effectiveness is shown by comparing the number and severity of faults detected to the approach of Chen et al 09 Zech [24] The approach is model-based and derives a risk model from a system model and a vulnerability knowledge base. On this basis a misuse case model is derived and test code generated from this model is executed.…”
Section: Risk-based Testing Approachesmentioning
confidence: 99%
“…[29], [30], [35], [36], [37] Migration to Cloud X [38], [39], [40], [41], [6] [6] X [38], [41], [6], [39], [40] [ mobile devices or check the applications' conformance to certain standards [11]. Unit testing activities are another area where on-demand software testing service can be utilized.…”
Section: Testing On the Cloudmentioning
confidence: 99%
“…In a cloud computing environment security testing should be applied on three layers: infrastructure, platform, and the service layer. Further, using PaaS or IaaS, the cloud provider itself cannot assure a customer's application security, as application specific code often introduces its own risks (Zech, 2011). This conflict in the security may be solved in the Service Level Agreement (SLA).…”
Section: Research Methodology and Methodsmentioning
confidence: 99%