메뉴 건너뛰기




Volumn , Issue , 2011, Pages 201-211

Testing software in age of data privacy: A balancing act

Author keywords

Data anonymity; PRIEST; Privacy framework; Software testing; Utility

Indexed keywords

CODE COVERAGE; DATA ANONYMITY; ENTERPRISE COMPUTING; LOWER COST; PRIEST; PROGRAM ANALYSIS; SENSITIVE INFORMATIONS; TEST COVERAGE; TEST ENGINEERS; TESTING SOFTWARE; UTILITY;

EID: 80053203782     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2025113.2025143     Document Type: Conference Paper
Times cited : (26)

References (39)
  • 2
    • 34548797068 scopus 로고    scopus 로고
    • On randomization, public information and the curse of dimensionality
    • DOI 10.1109/ICDE.2007.367859, 4221662, 23rd International Conference on Data Engineering, ICDE 2007
    • C. C. Aggarwal. On randomization, public information and the curse of dimensionality. In ICDE, pages 136-145, 2007. (Pubitemid 47422017)
    • (2007) Proceedings - International Conference on Data Engineering , pp. 136-145
    • Aggarwal, C.C.1
  • 3
    • 41549109791 scopus 로고    scopus 로고
    • On static and dynamic methods for condensation-based privacy-preserving data mining
    • March
    • C. C. Aggarwal and P. S. Yu. On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans. Database Syst., 33:2:1-2:39, March 2008.
    • (2008) ACM Trans. Database Syst. , vol.33 , Issue.2 , pp. 1-2
    • Aggarwal, C.C.1    Yu, P.S.2
  • 6
    • 77954465491 scopus 로고    scopus 로고
    • Robust persistence layers
    • S. Ambler. Robust persistence layers. Softw. Dev., 6(2):73-75, 1998.
    • (1998) Softw. Dev. , vol.6 , Issue.2 , pp. 73-75
    • Ambler, S.1
  • 8
    • 79952014468 scopus 로고    scopus 로고
    • Census bureau obscured personal data-too well, some say
    • Feb.
    • C. Bialik. Census bureau obscured personal data - too well, some say. The Wall Street Journal, Feb. 2010.
    • (2010) The Wall Street Journal
    • Bialik, C.1
  • 9
    • 65449147584 scopus 로고    scopus 로고
    • The cost of privacy: Destruction of data-mining utility in anonymized data publishing
    • J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In KDD, pages 70-78, 2008.
    • (2008) KDD , pp. 70-78
    • Brickell, J.1    Shmatikov, V.2
  • 10
    • 79959876214 scopus 로고    scopus 로고
    • B-anonymity: A model for anonymized behaviour-preserving test and debugging data
    • A. Budi, D. Lo, L. Jiang, and Lucia. b-anonymity: a model for anonymized behaviour-preserving test and debugging data. In PLDI, pages 447-457, 2011.
    • (2011) PLDI , pp. 447-457
    • Budi, A.1    Lo, D.2    Jiang, L.3    Lucia4
  • 12
    • 0016993577 scopus 로고
    • A system to generate test data and symbolically execute programs
    • L. A. Clarke. A system to generate test data and symbolically execute programs. IEEE Trans. Softw. Eng., 2(3):215-222, 1976.
    • (1976) IEEE Trans. Softw. Eng. , vol.2 , Issue.3 , pp. 215-222
    • Clarke, L.A.1
  • 13
    • 85008249099 scopus 로고    scopus 로고
    • Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
    • J. Clause and A. Orso. Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting. In ISSTA, pages 249-260, 2009.
    • (2009) ISSTA , pp. 249-260
    • Clause, J.1    Orso, A.2
  • 14
    • 79959882402 scopus 로고    scopus 로고
    • Camouflage: Automated anonymization of field data
    • J. A. Clause and A. Orso. Camouflage: automated anonymization of field data. In ICSE, pages 21-30, 2011.
    • (2011) ICSE , pp. 21-30
    • Clause, J.A.1    Orso, A.2
  • 15
    • 70849095741 scopus 로고    scopus 로고
    • Anonymized data: Generation, models, usage
    • G. Cormode and D. Srivastava. Anonymized data: generation, models, usage. In SIGMOD, pages 1015-1018, 2009.
    • (2009) SIGMOD , pp. 1015-1018
    • Cormode, G.1    Srivastava, D.2
  • 16
    • 80053192899 scopus 로고    scopus 로고
    • Datamonitor. Application testing services: Global market forecast model
    • Aug.
    • Datamonitor. Application testing services: global market forecast model. Datamonitor Research Store, Aug. 2007.
    • (2007) Datamonitor Research Store
  • 18
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 19
    • 77950913146 scopus 로고    scopus 로고
    • Measuring risk and utility of anonymized data using information theory
    • J. Domingo-Ferrer and D. Rebollo-Monedero. Measuring risk and utility of anonymized data using information theory. In EDBT/ICDT, pages 126-130, 2009.
    • (2009) EDBT/ICDT , pp. 126-130
    • Domingo-Ferrer, J.1    Rebollo-Monedero, D.2
  • 21
    • 79956336217 scopus 로고    scopus 로고
    • Introduction to privacy-preserving data publishing: Concepts and techniques
    • Chapman & Hall/CRC, August
    • B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Data Mining and Knowledge Discovery. Chapman & Hall/CRC, August 2010.
    • (2010) Data Mining and Knowledge Discovery
    • Fung, B.C.M.1    Wang, K.2    Fu, A.W.-C.3    Yu, P.S.4
  • 22
    • 34548273557 scopus 로고    scopus 로고
    • Compositional dynamic test generation
    • P. Godefroid. Compositional dynamic test generation. In POPL, pages 47-54, 2007.
    • (2007) POPL , pp. 47-54
    • Godefroid, P.1
  • 23
    • 79952026752 scopus 로고    scopus 로고
    • Is data privacy always good for software testing?
    • M. Grechanik, C. Csallner, C. Fu, and Q. Xie. Is data privacy always good for software testing? In ISSRE, pages 368-377, 2010.
    • (2010) ISSRE , pp. 368-377
    • Grechanik, M.1    Csallner, C.2    Fu, C.3    Xie, Q.4
  • 26
    • 1542286887 scopus 로고    scopus 로고
    • A family of test adequacy criteria for database-driven applications
    • G. M. Kapfhammer and M. L. Soffa. A family of test adequacy criteria for database-driven applications. In ESEC/FSE, pages 98-107, 2003.
    • (2003) ESEC/FSE , pp. 98-107
    • Kapfhammer, G.M.1    Soffa, M.L.2
  • 27
    • 0027029758 scopus 로고
    • Undecidability of static analysis
    • W. Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
    • (1992) ACM Lett. Program. Lang. Syst. , vol.1 , Issue.4 , pp. 323-337
    • Landi, W.1
  • 28
    • 70350634219 scopus 로고    scopus 로고
    • On the tradeoff between privacy and utility in data publishing
    • T. Li and N. Li. On the tradeoff between privacy and utility in data publishing. In KDD, pages 517-526, 2009.
    • (2009) KDD , pp. 517-526
    • Li, T.1    Li, N.2
  • 29
    • 34548738230 scopus 로고    scopus 로고
    • Hybrid concolic testing
    • R. Majumdar and K. Sen. Hybrid concolic testing. In ICSE, pages 416-426, 2007.
    • (2007) ICSE , pp. 416-426
    • Majumdar, R.1    Sen, K.2
  • 31
    • 67650289929 scopus 로고    scopus 로고
    • Maximizing privacy under data distortion constraints in noise perturbation methods
    • Y. Rachlin, K. Probst, and R. Ghani. Maximizing privacy under data distortion constraints in noise perturbation methods. In PinKDD, pages 92-110, 2008.
    • (2008) PinKDD , pp. 92-110
    • Rachlin, Y.1    Probst, K.2    Ghani, R.3
  • 32
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • March
    • S. P. Reiss. Practical data-swapping: the first steps. ACM Trans. Database Syst., 9:20-37, March 1984.
    • (1984) ACM Trans. Database Syst. , vol.9 , pp. 20-37
    • Reiss, S.P.1
  • 33
    • 84987978538 scopus 로고
    • Non-reversible privacy transformations
    • S. P. Reiss, M. J. Post, and T. Dalenius. Non-reversible privacy transformations. In PODS, pages 139-146, 1982.
    • (1982) PODS , pp. 139-146
    • Reiss, S.P.1    Post, M.J.2    Dalenius, T.3
  • 34
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents'identities in microdata release
    • P. Samarati. Protecting respondents'identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6):1010-1027, 2001.
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 37
    • 78649768390 scopus 로고    scopus 로고
    • MODA: Automated test generation for database applications via mock objects
    • K. Taneja, Y. Zhang, and T. Xie. MODA: Automated test generation for database applications via mock objects. In ASE, pages 289-292, 2010.
    • (2010) ASE , pp. 289-292
    • Taneja, K.1    Zhang, Y.2    Xie, T.3
  • 39
    • 84857550008 scopus 로고    scopus 로고
    • Regression testing minimisation, selection and prioritisation: A survey
    • S. Yoo and M. Harman. Regression testing minimisation, selection and prioritisation: A survey. STVR, to appear, 2011.
    • (2011) STVR
    • Yoo, S.1    Harman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.