David R. Kuhn
National Institute of Standards and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by David R. Kuhn.
engineering of computer based systems | 2007
Yu Lei; Raghu N. Kacker; David R. Kuhn; Vadim Okun; Jim Lawrence
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can also be caused by interactions involving more than two parameters. In this paper, we generalize an existing strategy, called in-parameter-order (IPO), from pairwise testing to t-way testing. A major challenge of our generalization effort is dealing with the combinatorial growth in the number of combinations of parameter values. We describe a t-way testing tool, called FireEye, and discuss design decisions that are made to enable an efficient implementation of the generalized IPO strategy. We also report several experiments that are designed to evaluate the effectiveness of FireEye
ieee symposium on security and privacy | 2005
Thomas J. Walsh; David R. Kuhn
Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of VoIP security and outlines steps for helping to secure an organizations VoIP network.
embedded and ubiquitous computing | 2008
Vincent C. Hu; David R. Kuhn; Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.
high-assurance systems engineering | 1999
Dolores R. Wallace; David R. Kuhn
Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assurance. This paper presents an analysis of software-related failures of medical devices that caused no death or injury but led to recalls by the manufacturers. The analysis categorizes the failures by their symptoms and faults, and discusses methods of preventing and detecting faults in each category. The nature of the faults provides lessons about the value of generally accepted quality practices for prevention and detection methods applied prior to system release. It also provides some insight into the need for formal requirements specification and for improved testing of complex hardware-software systems.
Special Publication (NIST SP) - 800-58 | 2005
David R. Kuhn; Thomas J. Walsh; Steffen Fries
Special Publication (NIST SP) - 800-142 | 2010
David R. Kuhn; Raghu N. Kacker; Yu Lei
First International Workshop on Combinatorial Testing | 2012
David R. Kuhn; James M. Higdon; Jim Lawrence; Raghu N. Kacker; Yu Lei
ACM Transactions on Software Engineering and Methodology | 1998
David R. Kuhn
Special Publication (NIST SP) - 500-204 | 1992
D Wallace; L. M. Ippolito; David R. Kuhn
arXiv: Quantum Physics | 2003
David R. Kuhn