Abstract
As a part of software non-functional testing, credibility testing is an important means to ensure the quality of software. However, there are few researches on the credibility testing method at present. In this paper, a new method of generating Credibility test cases is proposed based on immune algorithm. By mining trustworthy requirements and combining with immune algorithm, a test case population is generated. Based on the result of test case, the Application Behavior Declaration is improved and a test case library is established. The conclusion proves that the trustworthy test cases based on immune algorithm can cover the credibility requirements and improve the testing efficiency.
Similar content being viewed by others
References
Wu, L., Ping, R., Ke, L., Hai-xin, D.: User cooperation trust model and its application in network security management. In: International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2335–2339. IEEE (2011)
Shen, C., Zhang, D., Liu, J., Ye, H., Qiu, S.: The strategy of Tc 3.0: A revolutionary evolution in trusted computing. https://doi.org/10.15302/J-SSCAE-2016.06.011
Yu, X., Jiang, G., Wang, P., Song, H., Wang, K., Liang, Y.: Research on application’s credibility verification based on ABD. Wuhan Univ. J. Nat. Sci. 21(1), 63–68 (2016)
Yu, X.J., & Liu, M.C.: Credibility verification of RESTful web services based on behavior declaration. In: 2nd International Conference on Computer Science and Technology (CST) (2017)
Wang, J., Hu, W., Zhang, Y., Chen, T., Yu, P., Zhao, B., Zhang, H.: Trusted container based on Docker. J. Wuhan Univ. (Nat. Sci. Ed.). 63(2), 102–108 (2017). https://doi.org/10.14188/j.1671-8836.2017.02.002
Pan, G., Li, K., Ouyang, A., Li, K.: Hybrid immune algorithm based on greedy algorithm and delete-cross operator for solving TSP. Soft Comput. 20(2), 555–566 (2016)
Gay, G., Staats, M., Whalen, M., Heimdahl, MPE.: The risks of coverage-directed test case generation. IEEE Trans. Softw. Eng. 41(8), 803–819 (2015)
Zhan, Z.: Research on automatic generation of test cases based on artificial immune algorithm. Central China Normal University (2008)
Ding, R., Dong, HB., Zhang, Y., Feng, XB.: Fast automatic generation method for software testing data based on key-point path. Ruan Jian Xue Bao/J. Softw. 27(4), 814–827 (2016) (in Chinese)
He, Z.T., Liu, C., Yan, H.H.: Software testing evolution process model and growth of software testing quality. Sci. China Inf. Sci. 58(3), 38101 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, X., Wang, J. A preliminary study of automatic generation of credibility test cases based on immune algorithm. Cluster Comput 22 (Suppl 6), 14867–14875 (2019). https://doi.org/10.1007/s10586-018-2427-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2427-1