Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David R. Kuhn is active.

Publication


Featured researches published by David R. Kuhn.


engineering of computer based systems | 2007

IPOG: A General Strategy for T-Way Software Testing

Yu Lei; Raghu N. Kacker; David R. Kuhn; Vadim Okun; Jim Lawrence

Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can also be caused by interactions involving more than two parameters. In this paper, we generalize an existing strategy, called in-parameter-order (IPO), from pairwise testing to t-way testing. A major challenge of our generalization effort is dealing with the combinatorial growth in the number of combinations of parameter values. We describe a t-way testing tool, called FireEye, and discuss design decisions that are made to enable an efficient implementation of the generalized IPO strategy. We also report several experiments that are designed to evaluate the effectiveness of FireEye


ieee symposium on security and privacy | 2005

Challenges in securing voice over IP

Thomas J. Walsh; David R. Kuhn

Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of VoIP security and outlines steps for helping to secure an organizations VoIP network.


embedded and ubiquitous computing | 2008

Property Verification for Generic Access Control Models

Vincent C. Hu; David R. Kuhn; Tao Xie

To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.


high-assurance systems engineering | 1999

Lessons from 342 medical device failures

Dolores R. Wallace; David R. Kuhn

Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assurance. This paper presents an analysis of software-related failures of medical devices that caused no death or injury but led to recalls by the manufacturers. The analysis categorizes the failures by their symptoms and faults, and discusses methods of preventing and detecting faults in each category. The nature of the faults provides lessons about the value of generally accepted quality practices for prevention and detection methods applied prior to system release. It also provides some insight into the need for formal requirements specification and for improved testing of complex hardware-software systems.


Special Publication (NIST SP) - 800-58 | 2005

Security Considerations for Voice Over IP Systems

David R. Kuhn; Thomas J. Walsh; Steffen Fries


Special Publication (NIST SP) - 800-142 | 2010

Practical Combinatorial Testing

David R. Kuhn; Raghu N. Kacker; Yu Lei


First International Workshop on Combinatorial Testing | 2012

Combinatorial Methods for Event Sequence Testing

David R. Kuhn; James M. Higdon; Jim Lawrence; Raghu N. Kacker; Yu Lei


ACM Transactions on Software Engineering and Methodology | 1998

Fault Classes and Error Detection in Specification Based Testing

David R. Kuhn


Special Publication (NIST SP) - 500-204 | 1992

High integrity software standards and guidelines

D Wallace; L. M. Ippolito; David R. Kuhn


arXiv: Quantum Physics | 2003

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

David R. Kuhn

Collaboration


Dive into the David R. Kuhn's collaboration.

Top Co-Authors

Avatar

Raghu N. Kacker

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Yu Lei

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Thomas J. Walsh

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Dolores R. Wallace

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Jim Lawrence

George Mason University

View shared research outputs
Top Co-Authors

Avatar

Dimitris E. Simos

National Technical University of Athens

View shared research outputs
Top Co-Authors

Avatar

Feng Duan

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kiran Shakya

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

L. M. Ippolito

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge