D. Richard Kuhn

According to our database1, D. Richard Kuhn authored at least 127 papers between 1989 and 2020.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to access control and combinatorial test methods".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Input Space Coverage Matters.
IEEE Computer, 2020

2019
Leading-Edge Technologies.
IT Professional, 2019

Rethinking Distributed Ledger Technology.
IEEE Computer, 2019

Taking Score on the Success of Blockchain, So Far.
IEEE Computer, 2019

Detecting Vulnerabilities in Android Applications using Event Sequences.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Applying Combinatorial Testing to Large-Scale Data Processing at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Measuring Combinatorial Coverage at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

An Approach to T-Way Test Sequence Generation With Constraints.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Systematic testing of post-quantum cryptographic implementations using metamorphic testing.
Proceedings of the 4th International Workshop on Metamorphic Testing, 2019

Browser fingerprinting using combinatorial sequence testing.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
Finding Bugs in Cryptographic Hash Function Implementations.
IEEE Trans. Reliability, 2018

Computer Science Education in 2018.
IT Professional, 2018

IoT Metrology.
IT Professional, 2018

Cyberthreats and Security.
IT Professional, 2018

Educating Next-Gen Computer Scientists.
IEEE Computer, 2018

Cybertrust in the IoT Age.
IEEE Computer, 2018

Can Reducing Faults Prevent Vulnerabilities?
IEEE Computer, 2018

Access Control for Emerging Distributed Systems.
IEEE Computer, 2018

Testing IoT Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Pseudo-Exhaustive Verification of Rule Based Systems.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Combinatorial security testing course.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

A Method-Level Test Generation Framework for Debugging Big Data Applications.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends.
IT Professional, 2017

What Happened to Software Metrics?
IEEE Computer, 2017

Combinatorial and MC/DC Coverage Levels of Random Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Combinatorial Testing of Full Text Search in Web Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Improving MC/DC and Fault Detection Strength Using Combinatorial Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Analysis of Vulnerability Trends, 2008-2016.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Model for T-Way Fault Profile Evolution during Testing.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Applying Combinatorial Testing to Data Mining Algorithms.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Using combinatorial testing to build navigation graphs for dynamic web applications.
Softw. Test., Verif. Reliab., 2016

Measuring and specifying combinatorial coverage of test input configurations.
ISSE, 2016

Learning Internet-of-Things Security "Hands-On".
IEEE Security & Privacy, 2016

Combinatorial Methods in Security Testing.
IEEE Computer, 2016

Access Control Policy Verification.
IEEE Computer, 2016

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

The Relationship between Software Bug Type and Number of Factors Involved in Failures.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

General Methods for Access Control Policy Verification (Application Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Pseudo-Exhaustive Testing of Attribute Based Access Control Rules.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Estimating t-Way Fault Profile Evolution During Testing.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
IT Security [Guest editors' introduction].
IT Professional, 2015

Attribute-Based Access Control.
IEEE Computer, 2015

Introducing Combinatorial Testing in a Large Organization.
IEEE Computer, 2015

Combinatorial Testing: Theory and Practice.
Advances in Computers, 2015

Combinatorial Methods in Software Testing.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Implementing and Managing Policy Rules in Attribute Based Access Control.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Constraint handling in combinatorial test generation using forbidden tuples.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Equivalence class verification and oracle-free testing using two-layer covering arrays.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

BEN: A combinatorial testing-based fault localization tool.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Improving IPOG's vertical growth based on a graph coloring scheme.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
IT Risks.
IT Professional, 2014

Software Testing.
IEEE Computer, 2014

Estimating Fault Detection Effectiveness.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

An Empirical Comparison of Combinatorial and Random Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

An Access Control scheme for Big Data processing.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
A general conformance testing framework for IEEE 11073 PHD's communication model.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Fault localization based on failure-inducing combinations.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

ACTS: A Combinatorial Test Generation Tool.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Combinatorial Coverage Measurement Concepts and Applications.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Applying Combinatorial Testing to the Siemens Suite.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

An Input Space Modeling Methodology for Combinatorial Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

CCM: A Tool for Measuring Combinatorial Coverage of System State Space.
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013

2012
Protecting Wireless Local Area Networks.
IT Professional, 2012

Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Combinatorial Methods for Event Sequence Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Identifying Failure-Inducing Combinations in a Combinatorial Test Set.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Combinatorial Testing of ACTS: A Case Study.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Efficient Algorithms for T-way Test Sequence Generation.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

2011
Managing Security: The Security Content Automation Protocol.
IT Professional, 2011

Vetting Mobile Apps.
IT Professional, 2011

Role Engineering: Methods and Standards.
IT Professional, 2011

Model Checking for Verification of Mandatory Access Control Models and Properties.
International Journal of Software Engineering and Knowledge Engineering, 2011

A Survey of Binary Covering Arrays.
Electr. J. Comb., 2011

Vulnerability Hierarchies in Access Control Configurations.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Practical combinatorial (t-way) methods for detecting complex faults in regression testing.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Finding Interaction Faults Adaptively Using Distance-Based Strategies.
Proceedings of the 18th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2011

A combinatorial approach to detecting buffer overflow vulnerabilities.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Data Loss Prevention.
IT Professional, 2010

Vulnerability Trends: Measuring Progress.
IT Professional, 2010

Introduction: Cybersecurity.
IT Professional, 2010

Adding Attributes to Role-Based Access Control.
IEEE Computer, 2010

2009
Understanding Insecure IT: Practical Risk Assessment.
IT Professional, 2009

Surviving Insecure IT: Effective Patch Management.
IT Professional, 2009

Introducing "Insecure IT".
IT Professional, 2009

Practical Interdomain Routing Security.
IT Professional, 2009

Role-Based Access Controls
CoRR, 2009

Combinatorial Software Testing.
IEEE Computer, 2009

A combinatorial approach to building navigation graphs for dynamic web applications.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing.
Softw. Test., Verif. Reliab., 2008

Practical Combinatorial Testing: Beyond Pairwise.
IT Professional, 2008

Property Verification for Generic Access Control Models.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control".
IEEE Security & Privacy, 2007

IPOG: A General Strategy for T-Way Software Testing.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

2006
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance.
IEEE Journal on Selected Areas in Communications, 2006

The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Pseudo-Exhaustive Testing for Software.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006

2005
A quantum cryptographic protocol with detection of compromised server.
Quantum Information & Computation, 2005

Challenges in Securing Voice over IP.
IEEE Security & Privacy, 2005

Composing and combining policies under the policy machine.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

2004
Software Fault Interactions and Implications for Software Testing.
IEEE Trans. Software Eng., 2004

2002
Quantum computing and communication.
Advances in Computers, 2002

2001
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

2000
The NIST model for role-based access control: towards a unified standard.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

1999
Fault classes and error detection capability of specification-based testing.
ACM Trans. Softw. Eng. Methodol., 1999

A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur., 1999

Toward Credible IT Testing and Certification.
IEEE Software, 1999

Lessons from 342 Medical Device Failures.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

1998
Role Based Access Control on MLS Systems without Kernel Changes.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998

1997
Sources of Failure in the Public Switched Telephone Network.
IEEE Computer, 1997

Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

1995
Future directions in role-based access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

1993
Improving Public Switched Network Security in an Open Environment.
IEEE Computer, 1993

1992
A Technique for Analyzing the Effects of Changes in Formal Specifications.
Comput. J., 1992

1990
On the Effective Use of Software Standards in Systems Integration.
Proceedings of the First International Conference on Systems Integration, 1990

Formal specification and verification of control software for cryptographic equipment.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Generating extended state transitions from structured specifications for process control systems.
Software Engineering Journal, 1989


  Loading...