5 research outputs found

    Ontología para Transferir Conocimiento en la Etapa de Pruebas de Software

    Get PDF
    The processes and activities in quality management of software engineering generate a large volume of knowledge, which is considered a critical factor for the quality of the software product. Therefore, a significant improvement of the effectiveness and fulfillment of the tasks that encompass this process, is required. It is there where the use of knowledge management methods and principles becomes the basis for managing the process. Following this argument, it was studied how ontologies can be used in knowledge management in the testing phase of software engineering. An ontology-based model was developed for this domain that covers the identification, formalization, distribution, and retention of knowledge, defining the indicators for each of these dimensions.Los procesos y actividades en la gestiÃģn de calidad de la ingeniería de software generan un gran volumen de conocimiento, considerado como un factor crítico para la calidad de producto software. En consecuencia, es necesario una mejora significativa de la efectividad y cumplimiento de las tareas que componen este proceso. Es ahí donde el uso de mÃĐtodos y principios de gestiÃģn de conocimiento se convierten en la base para gestionar este proceso. Siguiendo este argumento, se estudiÃģ cÃģmo las ontologías pueden utilizarse en la gestiÃģn de conocimiento en la fase de pruebas de la ingeniería del software. Se desarrollÃģ un modelo basado en ontologías para ese dominio que abarca la identificaciÃģn, formalizaciÃģn, distribuciÃģn, y retenciÃģn de conocimiento definiendo los indicadores para cada una de estas dimensiones

    Towards Ontology-based SQA Recommender for Agile Software Development

    Get PDF
    Agility is heavily dependent on tacit knowledge, skilled and motivated employees, and frequent communications. Although, the Agile Manifesto claims fast and light software development process while maintaining high quality, it is however not very clear how current agile practices and methods attain quality under time pressure and unstable requirements. In this paper, we present an ontological approach for process-driven Quality Assurance support for agile software development. Challenges related to the role of Quality Assurance in agile projects are addressed by developing a process-driven recommender that provides tailored resources to user’s queries. The proposed ontological model embeds both conceptual and operational SQA knowledge about software processes and their requirements, including quality attributes, SQA measurements, SQA metrics and related SQA techniques and procedures

    A Framework of Test Case Generation with Software Requirements Ontology

    Get PDF
    āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāļĄāļŦāļēāļšāļąāļ“āļ‘āļīāļ• (āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻ), 2565Recently modern society technology is involved in the daily life of all humans. This allows developers to create new concepts and technology designs in order to respond to users’ requirements. Therefore, this causes the system development to become more complex. Consequently, it leads to a high possibility of system errors. Therefore, software testing is an important aspect to guarantee users that the developed system is error-free. In user acceptance and system testing, test cases are normally generated from the software requirements specification (SRS). As the SRS is written in a natural language which has an uncertain structure, it can possibly be ambiguous. As a result, this may cause the wrong interpretation of the requirements and finally it can allow the occurrence of incorrect test case generation. This research proposes a framework of test case generation with software requirements ontology to enhance the reliability of existing verification and validation (V&V) techniques. This framework uses ontology and Control Natural Languages (CNL) to represent the semantics of functional requirements in SRS documents in order to increase the structure of natural language. Furthermore, the effective black-box testing technique, Combination of Equivalence and Classification Tree Method (CCTM), is included in this framework. This testing technique enables test case coverage and reduction compared with other testing techniques. This results in the generated test cases to be more accurate and efficientāđƒāļ™āļĒāļļāļ„āļ›āļąāļˆāļˆāļļāļšāļąāļ™āđ€āļ›āđ‡āļ™āļĒāļļāļ„āļ—āļĩāđˆāđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāđ„āļ”āđ‰āđ€āļ‚āđ‰āļēāļĄāļēāļĄāļĩāļšāļ—āļšāļēāļ—āđƒāļ™āļŠāļĩāļ§āļīāļ•āļ›āļĢāļ°āļˆāļģāļ§āļąāļ™āļ‚āļ­āļ‡āļĄāļ™āļļāļĐāļĒāđŒāđ‚āļ”āļĒāļŠāļīāđ‰āļ™āđ€āļŠāļīāļ‡ āļ—āļģāđƒāļŦāđ‰āļ™āļąāļāļžāļąāļ’āļ™āļēāđ€āļāļīāļ”āđāļ™āļ§āļ„āļīāļ”āđāļĨāļ°āļ­āļ­āļāđāļšāļšāđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāđƒāļŦāļĄāđˆ āđ† āļ‚āļķāđ‰āļ™āļĄāļēāļĄāļēāļāļĄāļēāļĒāđ€āļžāļ·āđˆāļ­āļ•āļ­āļšāļŠāļ™āļ­āļ‡āļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ‚āļ­āļ‡āļœāļđāđ‰āđƒāļŠāđ‰āļ‡āļēāļ™ āđāļ•āđˆāļĄāļĩāļŦāļĨāļēāļĒāļ„āļĢāļąāđ‰āļ‡āļ—āļĩāđˆāļĢāļ°āļšāļšāļ—āļĩāđˆāļ–āļđāļāļžāļąāļ’āļ™āļēāļ‚āļķāđ‰āļ™āļĄāļēāđƒāļŦāļĄāđˆāļ™āļąāđ‰āļ™āđ€āļāļīāļ”āļ‚āđ‰āļ­āļœāļīāļ”āļžāļĨāļēāļ”āļˆāļēāļāļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļ—āļĩāđˆāđ„āļĄāđˆāļĄāļĩāļ›āļĢāļ°āļŠāļīāļ—āļ˜āļīāļ āļēāļžāđƒāļ™āļāļēāļĢāļžāļąāļ’āļ™āļēāļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒ āļ—āļģāđƒāļŦāđ‰āļ™āļąāļāļžāļąāļ’āļ™āļēāļ•āđ‰āļ­āļ‡āļāļĨāļąāļšāļĄāļēāļ—āļ§āļ™āļŠāļ­āļšāļĢāļ°āļšāļšāđƒāļŦāļĄāđˆāļ­āļĩāļāļ„āļĢāļąāđ‰āļ‡āđ€āļžāļ·āđˆāļ­āļŦāļēāļ‚āđ‰āļ­āļœāļīāļ”āļžāļĨāļēāļ” āļ”āļąāļ‡āļ™āļąāđ‰āļ™āļ‚āļąāđ‰āļ™āļ•āļ­āļ™āđƒāļ™āļāļēāļĢāļ—āļ”āļŠāļ­āļšāļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒāļˆāļķāļ‡āļĄāļĩāļ„āļ§āļēāļĄāļŠāļģāļ„āļąāļāđƒāļ™āļāļēāļĢāļ—āļģāđƒāļŦāđ‰āļœāļđāđ‰āđƒāļŠāđ‰āļĄāļąāđˆāļ™āđƒāļˆāđ„āļ”āđ‰āļ§āđˆāļēāļĢāļ°āļšāļšāļ—āļĩāđˆāļžāļąāļ’āļ™āļēāļ‚āļķāđ‰āļ™āļĄāļēāļ™āļąāđ‰āļ™āļĄāļĩāļ„āļļāļ“āļ āļēāļžāđāļĨāļ°āđ„āļĄāđˆāđ€āļāļīāļ”āļ„āļ§āļēāļĄāļœāļīāļ”āļžāļĨāļēāļ”āđƒāļ™āļĢāļ°āļŦāļ§āđˆāļēāļ‡āļāļēāļĢāđƒāļŠāđ‰āļ‡āļēāļ™ āđƒāļ™āļāļēāļĢāļ—āļ”āļŠāļ­āļšāļāļēāļĢāļĒāļ­āļĄāļĢāļąāļšāļˆāļēāļāļœāļđāđ‰āđƒāļŠāđ‰āđāļĨāļ°āļāļēāļĢāļ—āļ”āļŠāļ­āļšāļĢāļ°āļšāļš āļ™āļąāļāļ—āļ”āļŠāļ­āļšāļˆāļ°āđƒāļŠāđ‰āđ€āļ­āļāļŠāļēāļĢāļ‚āđ‰āļ­āļāļģāļŦāļ™āļ”āļ„āļļāļ“āļĨāļąāļāļĐāļ“āļ°āļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒāđƒāļ™āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļš āļ‹āļķāđˆāļ‡āđ€āļ­āļāļŠāļēāļĢāļˆāļ°āļ–āļđāļāđ€āļ‚āļĩāļĒāļ™āļ‚āļķāđ‰āļ™āļ”āđ‰āļ§āļĒāļ āļēāļĐāļēāļ˜āļĢāļĢāļĄāļŠāļēāļ•āļīāļ—āļģāđƒāļŦāđ‰āļ‚āđ‰āļ­āļāļģāļŦāļ™āļ”āļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ—āļĩāđˆāļĢāļ°āļšāļļāđƒāļ™āđ€āļ­āļāļŠāļēāļĢāļĄāļĩāđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡āļ—āļĩāđˆāđ„āļĄāđˆāļŠāļąāļ”āđ€āļˆāļ™ āļŠāđˆāļ‡āļœāļĨāđƒāļŦāđ‰āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļšāđ„āļĄāđˆāđ„āļ”āđ‰āļĄāļēāļ•āļĢāļāļēāļ™āđāļĨāļ°āđ€āļāļīāļ”āļ‚āđ‰āļ­āļœāļīāļ”āļžāļĨāļēāļ”āđƒāļ™āļĢāļ°āļŦāļ§āđˆāļēāļ‡āļāļēāļĢāļ—āļ”āļŠāļ­āļšāļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒ āļ”āļąāļ‡āļ™āļąāđ‰āļ™āđƒāļ™āļ‡āļēāļ™āļ§āļīāļˆāļąāļĒāļ™āļĩāđ‰āļœāļđāđ‰āļ§āļīāļˆāļąāļĒāļˆāļķāļ‡āđ„āļ”āđ‰āļ™āļģāđ€āļŠāļ™āļ­āļāļĢāļ­āļšāđāļ™āļ§āļ„āļīāļ”āļŠāļģāļŦāļĢāļąāļšāļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļšāļ”āđ‰āļ§āļĒāļ­āļ­āļ™āđ‚āļ—āđ‚āļĨāļĒāļĩāļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒāļ—āļĩāđˆāļ–āļđāļāđƒāļŠāđ‰āđāļ—āļ™āļ„āļ§āļēāļĄāļŦāļĄāļēāļĒāļ‚āļ­āļ‡āļ‚āđ‰āļ­āļāļģāļŦāļ™āļ”āļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāđāļĨāļ°āļāļēāļĢāļ›āļĢāļ°āļĒāļļāļāļ•āđŒāđƒāļŠāđ‰āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļĄāļ·āļ­āļ āļēāļĐāļēāļ˜āļĢāļĢāļĄāļŠāļēāļ•āļīāļ„āļ§āļšāļ„āļļāļĄ āđ€āļžāļ·āđˆāļ­āđƒāļŦāđ‰āļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļĄāļĩāđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡āļ—āļĩāđˆāļŠāļąāļ”āđ€āļˆāļ™āļāđˆāļ­āļ™āļ™āļģāđ„āļ›āļŠāļĢāđ‰āļēāļ‡āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļš āļĢāļ§āļĄāļ–āļķāļ‡āļœāļđāđ‰āļ§āļīāļˆāļąāļĒāđ„āļ”āđ‰āļžāļīāļˆāļēāļĢāļ“āļēāđ€āļ—āļ„āļ™āļīāļ„āļāļēāļĢāļ—āļ”āļŠāļ­āļšāđāļšāļšāļāļĨāđˆāļ­āļ‡āļ”āļģāļ—āļĩāđˆāļĄāļĩāļ›āļĢāļ°āļŠāļīāļ—āļ˜āļīāļ āļēāļž āļ„āļ·āļ­ āđ€āļ—āļ„āļ™āļīāļ„āļāļēāļĢāļĢāļ§āļĄāļāļąāļ™āļ‚āļ­āļ‡āļŠāļąāđ‰āļ™āļŠāļĄāļĄāļđāļĨāđāļĨāļ°āļ•āđ‰āļ™āđ„āļĄāđ‰āļāļēāļĢāļˆāļģāđāļ™āļāļĄāļēāđƒāļŠāđ‰ āđ€āļžāļ·āđˆāļ­āđƒāļŦāđ‰āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļšāļĄāļĩāļ„āļ§āļēāļĄāļ„āļĢāļ­āļšāļ„āļĨāļļāļĄāđāļĨāļ°āļĨāļ”āļ„āļ§āļēāļĄāļ‹āđ‰āļģāļ‹āđ‰āļ­āļ™ āļŠāđˆāļ‡āļœāļĨāđƒāļŦāđ‰āļāļĢāļ“āļĩāļ—āļ”āļŠāļ­āļšāļ—āļĩāđˆāđ„āļ”āđ‰āļĄāļĩāļ„āļ§āļēāļĄāļ–āļđāļāļ•āđ‰āļ­āļ‡āđāļĄāđˆāļ™āļĒāļģ āđāļĨāļ°āļ—āļģāđƒāļŦāđ‰āļāļēāļĢāļ—āļ”āļŠāļ­āļšāļĄāļĩāļ›āļĢāļ°āļŠāļīāļ—āļ˜āļīāļ āļēāļžāļ•āļĢāļ‡āļ•āļēāļĄāļ„āļ§āļēāļĄāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ‚āļ­āļ‡āļœāļđāđ‰āđƒāļŠāđ‰āļ‡āļēāļ™āļĄāļēāļāļĒāļīāđˆāļ‡āļ‚āļķāđ‰

    HCAPP-SEC : selection and analysis of security assessment items based on heuristics and criteria

    Get PDF
    Orientador: Mario JinoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia ElÃĐtrica e de ComputaçÃĢoResumo: Nos dias atuais, o software tem papel importante na maioria das indÚstrias e ÃĄreas de atividade. Os aspectos relacionados à segurança da informaçÃĢo sÃĢo críticos, com forte impacto na qualidade dos sistemas. Como saber se uma determinada avaliaçÃĢo de segurança foi boa ou suficiente? Por meio de critÃĐrios e heurísticas ÃĐ possível determinar a suficiÊncia da avaliaçÃĢo de segurança e, consequentemente, analisar sua qualidade. Fontes de conhecimento (normas, padrÃĩes, conjuntos de casos de teste) e seus itens de avaliaçÃĢo sÃĢo instrumentos essenciais para avaliar a segurança dos sistemas. Para criar projetos de avaliaçÃĢo de segurança mais efetivos ÃĐ necessÃĄrio saber as propriedades de segurança e as dimensÃĩes de avaliaçÃĢo abordadas em cada item de uma fonte de conhecimento de segurança. Nesta tese, uma abordagem para selecionar e analisar itens de avaliaçÃĢo de segurança (HCApp-Sec) ÃĐ proposta; suas bases provÊm de critÃĐrios e heurísticas de avaliaçÃĢo e visam a aumentar a cobertura das dimensÃĩes de avaliaçÃĢo e propriedades de segurança dos projetos de avaliaçÃĢo. A abordagem centra-se em selecionar itens de avaliaçÃĢo de forma sistemÃĄtica. Sistematiza-se o processo de avaliaçÃĢo de segurança por meio da formalizaçÃĢo conceitual da ÃĄrea de avaliaçÃĢo de segurança; uma ontologia (SecAOnto) ÃĐ usada para explicitar os conceitos principais. HCApp-Sec pode ser aplicada a qualquer fonte de conhecimento de segurança para selecionar ou analisar itens de avaliaçÃĢo em relaçÃĢo a 11 propriedades de segurança e 6 dimensÃĩes de avaliaçÃĢo. A abordagem ÃĐ flexível e permite que outras dimensÃĩes e propriedades sejam incorporadas. Nossa proposta visa a apoiar: (i) a geraçÃĢo de projetos de avaliaçÃĢo de segurança de alta cobertura que incluam itens mais abrangentes e com cobertura assegurada das principais características de segurança e (ii) a avaliaçÃĢo de fontes de conhecimento de segurança em relaçÃĢo à cobertura de aspectos de segurança. Em um estudo de caso, um mapeamento de fontes de conhecimento de segurança ÃĐ apresentado. EntÃĢo, aplica-se a proposta a uma fonte de conhecimento de segurança bem conhecida (ISO/IEC 27001); seus itens sÃĢo analisadosAbstract: Nowadays, software plays an important role in most industries and application domains. The aspects related to information security are critical, with a strong impact on systems quality. How to know whether a particular security assessment was good or sufficient? By means of criteria and heuristics it is possible to determine the sufficiency of the security assessment and consequently to analyze its quality. Knowledge sources (standards, patterns, sets of test cases) and their assessment items are essential instruments for evaluation of systems security. To create security assessment designs with suitable assessment items we need to know which security properties and assessment dimensions are covered by each knowledge source. We propose an approach for selecting and analyzing security assessment items (HCApp-Sec); its foundations come from assessment criteria and heuristics and it aims to increase the coverage of assessment dimensions and security properties in assessment designs. Our proposal focuses on the selection of better assessment items in a systematic manner. We systematize the security assessment process by means of a conceptual formalization of the security assessment area; an ontology of security assessment makes explicit the main concepts. HCApp-Sec can be applied to any security knowledge source to select or analyze assessment items with respect to 11 security properties and 6 assessment dimensions. The approach is flexible and allows other dimensions and properties to be incorporated. Our proposal is meant to support: (i) the generation of high-coverage assessment designs which includes security assessment items with assured coverage of the main security characteristics and (ii) evaluation of security standards with respect to coverage of security aspects. We have applied our proposal to a well known security knowledge source (ISO/IEC 27001); their assessment items were analyzedDoutoradoEngenharia de ComputaçÃĢoDoutor em Engenharia ElÃĐtric
    corecore