Skip to main content
Log in

A preliminary study of automatic generation of credibility test cases based on immune algorithm

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

As a part of software non-functional testing, credibility testing is an important means to ensure the quality of software. However, there are few researches on the credibility testing method at present. In this paper, a new method of generating Credibility test cases is proposed based on immune algorithm. By mining trustworthy requirements and combining with immune algorithm, a test case population is generated. Based on the result of test case, the Application Behavior Declaration is improved and a test case library is established. The conclusion proves that the trustworthy test cases based on immune algorithm can cover the credibility requirements and improve the testing efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Wu, L., Ping, R., Ke, L., Hai-xin, D.: User cooperation trust model and its application in network security management. In: International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2335–2339. IEEE (2011)

  2. Shen, C., Zhang, D., Liu, J., Ye, H., Qiu, S.: The strategy of Tc 3.0: A revolutionary evolution in trusted computing. https://doi.org/10.15302/J-SSCAE-2016.06.011

  3. Yu, X., Jiang, G., Wang, P., Song, H., Wang, K., Liang, Y.: Research on application’s credibility verification based on ABD. Wuhan Univ. J. Nat. Sci. 21(1), 63–68 (2016)

    Article  Google Scholar 

  4. Yu, X.J., & Liu, M.C.: Credibility verification of RESTful web services based on behavior declaration. In: 2nd International Conference on Computer Science and Technology (CST) (2017)

  5. Wang, J., Hu, W., Zhang, Y., Chen, T., Yu, P., Zhao, B., Zhang, H.: Trusted container based on Docker. J. Wuhan Univ. (Nat. Sci. Ed.). 63(2), 102–108 (2017). https://doi.org/10.14188/j.1671-8836.2017.02.002

  6. Pan, G., Li, K., Ouyang, A., Li, K.: Hybrid immune algorithm based on greedy algorithm and delete-cross operator for solving TSP. Soft Comput. 20(2), 555–566 (2016)

    Article  Google Scholar 

  7. Gay, G., Staats, M., Whalen, M.,  Heimdahl, MPE.: The risks of coverage-directed test case generation. IEEE Trans. Softw. Eng. 41(8), 803–819 (2015)

    Article  Google Scholar 

  8. Zhan, Z.: Research on automatic generation of test cases based on artificial immune algorithm. Central China Normal University (2008)

  9. Ding, R., Dong, HB., Zhang, Y., Feng, XB.: Fast automatic generation method for software testing data based on key-point path. Ruan Jian Xue Bao/J. Softw. 27(4), 814–827 (2016) (in Chinese)

    MathSciNet  Google Scholar 

  10. He, Z.T., Liu, C., Yan, H.H.: Software testing evolution process model and growth of software testing quality. Sci. China Inf. Sci. 58(3), 38101 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, X., Wang, J. A preliminary study of automatic generation of credibility test cases based on immune algorithm. Cluster Comput 22 (Suppl 6), 14867–14875 (2019). https://doi.org/10.1007/s10586-018-2427-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2427-1

Keywords

Navigation