A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed Systems

  • Ahmad SaifanEmail author
  • Juergen Dingel
Conference paper


This paper provides a detailed survey of how Model- Based Testing (MBT) has been used for testing different quality attributes of distributed systems such as security, performance, reliability, and correctness. For this purpose, three additional criteria are added to the classification. These criteria are: the purpose of testing, the test case paradigm, and the type of conformance checking. A comparison between different MBT tools based on the classification is also given.


Security Requirement Label Transition System Generate Test Case Role Base Access Control Test Driver 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    A. Saifan and J. Dingel: “Model-Based Testing of Distributed Systems”. Technichal report 2008-548, school of computing, Queen’s University (2008).Google Scholar
  2. [2]
    S. Barber. What is performance testing?,2007.Available at:,289483,sid92gci1247594,00.html
  3. [3]
    A. Huima. “Implementing Conformiq Qtronic”. In TestCom/FATES, pages 1-12,Tallinn, Estonia, June 2007.Google Scholar
  4. [4]
    E. Lazowska, J. Zahorjan, G. Graham, and K. Sevcik. “Quantitative System Performance: Computer System Analysis Using Queuing Network Models”. Prentice-Hall, Inc., NJ, USA, 1984.Google Scholar
  5. [5]
    S. Bernardi, S. Donatelli, and J. Merseguer. “From UML Sequence Diagrams and Statecharts To Analyzable Petri Net Models”. In WOSP ‘02: Proceedings of the 3rd international workshop on Software and performance, pages 35-45, New York, NY, USA, 2002. ACM.Google Scholar
  6. [6]
    R.Pooley. “Using UML to Derive Stochastic Process Algebra Models”.In Proceedings of the 15th UK Performance Engineering Workshop, pages 23-33, 1999.Google Scholar
  7. [7]
    R. Chandramouli and M. Blackburn. “Model-based Automated Security Functional Testing”. In OMGs Seventh Annual Workshop on distributed objects and components security, Baltimore, Maryland, USA, April 2003.Google Scholar
  8. [8]
    G. Denaro, A. Polini, and W. Emmerich. “Early Performance Testing of Distributed Software Applications”. SIGSOFT Softw. Eng. Notes, vol. 29(1), pp. 94-103, 2004.CrossRefGoogle Scholar
  9. [9]
    J. Jürjens. “Towards Development oF Secure Systems USING UMLsec”. In Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001, Genova, Italy, April, 2001, Proc., volume 2029 of Lecture Notes in Computer Science, pages 187-200. Springer, 2001.Google Scholar
  10. [10]
    J. Jürjens. “Secure Systems Development With UML”. SpringerVerlag, 2005.Google Scholar
  11. [11]
    M. Hussein and M. Zulkernine. “UMLintr: A UML Profile for Specifying Intrusions”. In 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems, 27-30, 2006, Potsdam, Germany, pages 279-288. IEEE Computer Society, 2006.Google Scholar
  12. [12]
    T. Lodderstedt, D. Basin, and J. Doser. “Secureuml: A UML-Based Modeling Language for Model-Driven Security”. In UML ‘02: Proc. of the 5th International Conference on The Unified Modeling Language, pages 426-441, London, UK, 2002. SpringerVerlag.Google Scholar
  13. [13]
    R. Chandramouli and M. Blackburn. “Model-Based Automated Security Functional Testing”. In OMGs Seventh Annual Workshop on distributed objects and components security, Baltimore, Maryland, USA, April, 2003.Google Scholar
  14. [14]
    M. Utting, A. Pretschner, and B. Legeard. “A Taxonomy of Model-Based Testing”. Technical Report 04/2006, Department of Computer Science, The Universiy of Waikato(New Zealand), 2006.Google Scholar
  15. [15]
    M. Blackburn, R. Busser, A. Nauman, and R. Chandramouli. “Model-Based Approach to Security Test Automation”, proceeding in quality week, June, 2001.Google Scholar
  16. [16]
    Oracle Corporation. Oracle8 Security Target Release 8.0.5, April, 2000.Google Scholar
  17. [17]
    G. Wimmel and J. Jürjens. “Specification-Based Test Generation for Security-Critical Systems Using Mutations”. In ICFEM ‘02: Proceedings of the 4th International Conference on Formal Engineering Methods, pages 471-482,London, UK, 2002. Springer-Verlag.Google Scholar
  18. [18]
    J. Chen. “On Using Static Analysis in Distributed System Testing”. In EDO’00: Revised Papers from the 2nd International Workshop on Engineering Distributed Objects, pp. 145-162, London, UK, 2001. SpringerVerlag.Google Scholar
  19. [19]
    IEEE Standard Glossary of Software Engineering Terminology. Technical report,1990.Google Scholar
  20. [20]
    H. Guen, R. Marie, and T. Thelin. “Reliability Estimation for Statistical Usage Testing Using Markov Chains”. In ISSRE ‘04: Proceedings of the 15th International Symposium on Software Reliability Engineering, pages 54-65, Washington, DC, USA, 2004. IEEE Computer Society.Google Scholar
  21. [21]
    J. Whittaker and M. Thomason. “A Markov Chain Model for Statistical Software Testing”. IEEE Trans. Softw. Eng., vol. 20(10), pp. 812-824, 1994.CrossRefGoogle Scholar
  22. [22]
    K. Sayre and J. Poore. “A Reliability Estimator for Model Based Software Testing”. In Proc. of the 13th International Symposium on Software Reliability Engineering, page 53, Washington, DC, USA, 2002. IEEE Computer Society.Google Scholar
  23. [23]
    C. Campbell, W. Grieskamp, L. Nachmanson, W. Schulte, N. Tillmann, and M. Veanes. “Model-Based Testing of Object-Oriented Reactive Systems With Spec Explorer”. Technical report, Microsoft Research, Redmond, May 2005.Google Scholar
  24. [24]
    G. Tretmans and H. Brinksma. “Côte de Resyste: “Automated Model Based Testing”. In Proc. of the 3rd PROGRESS workshop on Embedded Systems, Veldhoven, The Netherlands, pages 246-255, Utrecht, 2002. STW Technology Foundation.Google Scholar
  25. [25]
    A. Dias Neto, R. Subramanyan, M. Vieira, and G. Travassos. “Characterization of Model-Based Software Testing Approaches”. Technical Report ES-713/07, PESC-COPPE/UFRJ,2007.Google Scholar
  26. [26]
    C. Heitmeyer, R. Jeffords, and B. Labaw. “Automated Consistency Checking of Requirements Specifications”. ACM Trans. Softw. Eng.Methodol.,vol. 5(3),pp.231-261, 1996.CrossRefGoogle Scholar
  27. [27]
    F. Bouquet, B. Legeard, F. Peureux, and E. Torreborre. “Mastering Test Generation from Smart Card Software Formal Models”. In Procs. ofthe Int. Workshop on Construction and Analysis of Safe, Secure and Interoperable Smart devices (CASSIS’04), vol. 3362 of LNCS, pp. 70-85, Marseille, France, March 2004. Springer.Google Scholar
  28. [28]
    S. Prowell. “JUMBL: A Tool for Model-Based Statistical Testing”. In HICSS ‘03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03) - Track 9, page 337.3, Washington, DC, USA, 2003. IEEE Computer Society.Google Scholar
  29. [29]
    D. Cohen, S. Dalal, M. Fredman, and G. Patton. “The AETG System: An Approach to Testing Based on Combinatiorial Design”. Software Engineering, vol.23 (7), pp.437-444, 1997.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.School of ComputingQueen’s University KingstonOntarioCanada

Personalised recommendations