Advertisement

Cluster Computing

, Volume 22, Supplement 6, pp 14867–14875 | Cite as

A preliminary study of automatic generation of credibility test cases based on immune algorithm

  • Xuejun Yu
  • Jing WangEmail author
Article
  • 205 Downloads

Abstract

As a part of software non-functional testing, credibility testing is an important means to ensure the quality of software. However, there are few researches on the credibility testing method at present. In this paper, a new method of generating Credibility test cases is proposed based on immune algorithm. By mining trustworthy requirements and combining with immune algorithm, a test case population is generated. Based on the result of test case, the Application Behavior Declaration is improved and a test case library is established. The conclusion proves that the trustworthy test cases based on immune algorithm can cover the credibility requirements and improve the testing efficiency.

Keywords

Immune algorithm Credibility Test case automatic generation 

References

  1. 1.
    Wu, L., Ping, R., Ke, L., Hai-xin, D.: User cooperation trust model and its application in network security management. In: International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2335–2339. IEEE (2011)Google Scholar
  2. 2.
    Shen, C., Zhang, D., Liu, J., Ye, H., Qiu, S.: The strategy of Tc 3.0: A revolutionary evolution in trusted computing.  https://doi.org/10.15302/J-SSCAE-2016.06.011
  3. 3.
    Yu, X., Jiang, G., Wang, P., Song, H., Wang, K., Liang, Y.: Research on application’s credibility verification based on ABD. Wuhan Univ. J. Nat. Sci. 21(1), 63–68 (2016)CrossRefGoogle Scholar
  4. 4.
    Yu, X.J., & Liu, M.C.: Credibility verification of RESTful web services based on behavior declaration. In: 2nd International Conference on Computer Science and Technology (CST) (2017)Google Scholar
  5. 5.
    Wang, J., Hu, W., Zhang, Y., Chen, T., Yu, P., Zhao, B., Zhang, H.: Trusted container based on Docker. J. Wuhan Univ. (Nat. Sci. Ed.). 63(2), 102–108 (2017).  https://doi.org/10.14188/j.1671-8836.2017.02.002
  6. 6.
    Pan, G., Li, K., Ouyang, A., Li, K.: Hybrid immune algorithm based on greedy algorithm and delete-cross operator for solving TSP. Soft Comput. 20(2), 555–566 (2016)CrossRefGoogle Scholar
  7. 7.
    Gay, G., Staats, M., Whalen, M.,  Heimdahl, MPE.: The risks of coverage-directed test case generation. IEEE Trans. Softw. Eng. 41(8), 803–819 (2015)CrossRefGoogle Scholar
  8. 8.
    Zhan, Z.: Research on automatic generation of test cases based on artificial immune algorithm. Central China Normal University (2008)Google Scholar
  9. 9.
    Ding, R., Dong, HB., Zhang, Y., Feng, XB.: Fast automatic generation method for software testing data based on key-point path. Ruan Jian Xue Bao/J. Softw. 27(4), 814–827 (2016) (in Chinese) MathSciNetGoogle Scholar
  10. 10.
    He, Z.T., Liu, C., Yan, H.H.: Software testing evolution process model and growth of software testing quality. Sci. China Inf. Sci. 58(3), 38101 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of InformationBeijing University of TechnologyBeijingChina

Personalised recommendations