Skip to main content

Showing 1–4 of 4 results for author: Lonetti, F

.
  1. arXiv:2304.14768  [pdf, other

    cs.SE

    Cross-coverage testing of functionally equivalent programs

    Authors: Antonia Bertolino, Guglielmo De Angelis, Felicita Di Giandomenico, Francesca Lonetti

    Abstract: Cross-coverage of a program P refers to the test coverage measured over a different program Q that is functionally equivalent to P. The novel concept of cross-coverage can find useful applications in the test of redundant software. We apply here cross-coverage for test suite augmentation and show that additional test cases generated from the coverage of an equivalent program, referred to as cross… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: 12 pages

  2. An automated model-based test oracle for access control systems

    Authors: Antonia Bertolino, Said Daoudagh, Francesca Lonetti, Eda Marchetti

    Abstract: In the context of XACML-based access control systems, an intensive testing activity is among the most adopted means to assure that sensible information or resources are correctly accessed. Unfortunately, it requires a huge effort for manual inspection of results: thus automated verdict derivation is a key aspect for improving the cost-effectiveness of testing. To this purpose, we introduce XACMET,… ▽ More

    Submitted 7 September, 2018; originally announced September 2018.

    Comments: 7 pages

    Journal ref: Proceedings of the 13th International Workshop on Automation of Software Test, pp. 2-8. ACM, 2018

  3. On-line tracing of XACML-based policy coverage criteria

    Authors: Francesca Lonetti, Eda Marchetti

    Abstract: Currently, eXtensible Access Control Markup Language (XACML) has becoming the standard for implementing access control policies and consequently more attention is dedicated to testing the correctness of XACML policies. In particular, coverage measures can be adopted for assessing test strategy effectiveness in exercising the policy elements. This study introduces a set of XACML coverage criteria a… ▽ More

    Submitted 7 September, 2018; originally announced September 2018.

    Comments: 9 pages, IET Software, available online http://digital-library.theiet.org/content/journals/10.1049/iet-sen.2017.0351

  4. arXiv:0805.1877   

    cs.NI

    Perfect tag identification protocol in RFID networks

    Authors: Maurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli

    Abstract: Radio Frequency IDentification (RFID) systems are becoming more and more popular in the field of ubiquitous computing, in particular for objects identification. An RFID system is composed by one or more readers and a number of tags. One of the main issues in an RFID network is the fast and reliable identification of all tags in the reader range. The reader issues some queries, and tags properly… ▽ More

    Submitted 1 July, 2022; v1 submitted 13 May, 2008; originally announced May 2008.

    Comments: There is a technical error