软件测试中英文对照

Acceptance testing | 验收测试

Acceptance Testing|可接受性测试

Accessibility test | 软体适用性测试

actual outcome|实际结果       

Ad hoc testing     | 随机测试

Algorithm analysis | 算法分析

algorithm|算法       

Alpha testing      | α测试

analysis|分析       

anomaly|异常       

application software|应用软件       

Application under test (AUT) | 所测试的应用程序

Architecture       | 构架

Artifact           | 工件

ASQ|自动化软件质量(Automated Software Quality)

Assertion checking | 断言检查

Association        | 关联

Audit              | 审计

audit trail|审计跟踪       

Automated Testing|自动化测试       

Backus-Naur Form|BNF范式       

baseline|基线       

Basic Block|基本块       

basis test set|基本测试集       

Behaviour          | 行为

Bench test         | 基准测试

benchmark|标杆/指标/基准       

Best practise      | 最佳实践

Beta testing       | β测试

Black Box Testing|黑盒测试       

Blocking bug       | 阻碍性错误

Bottom-up testing  | 自底向上测试

boundary value coverage|边界值覆盖       

boundary value testing|边界值测试       

Boundary values    | 边界值

Boundry Value Analysis|边界值分析       

branch condition combination coverage|分支条件组合覆盖       

branch condition combination testing|分支条件组合测试       

branch condition coverage|分支条件覆盖       

branch condition testing|分支条件测试

branch condition|分支条件 

Branch coverage    | 分支覆盖

branch outcome|分支结果       

branch point|分支点        

branch testing|分支测试       

branch|分支       

Breadth Testing|广度测试       

Brute force testing| 强力测试

Buddy test         | 合伙测试

Buffer             | 缓冲

Bug                | 错误

Bug bash           | 错误大扫除

bug fix            |  错误修正

Bug report         | 错误报告

Bug tracking system| 错误跟踪系统

bug|缺陷

Build              | 工作版本(内部小版本)

Build Verfication tests(BVTs)| 版本验证测试

Build-in           | 内置

Capability Maturity Model (CMM)|   能力成熟度模型

Capability Maturity Model Integration (CMMI)| 能力成熟度模型整合

capture/playback tool|捕获/回放工具       

Capture/Replay Tool|捕获/回放工具       

CASE|计算机辅助软件工程(computer aided software engineering)

CAST|计算机辅助测试       

cause-effect graph|因果图       

certification        |证明       

change control|变更控制       

Change Management  |变更管理

Change Request     |变更请求

Character Set      | 字符集

Check In           |检入

Check Out          |检出

Closeout           | 收尾

code audit        |代码审计       

Code coverage      | 代码覆盖

Code Inspection|代码检视       

Code page          | 代码页

Code rule          | 编码规范

Code sytle         | 编码风格

Code Walkthrough|代码走读       

code-based testing|基于代码的测试       

coding standards|编程规范       

Common sense       | 常识

Compatibility Testing|兼容性测试       

complete path testing        |完全路径测试       

completeness|完整性       

complexity        |复杂性       

Component testing     | 组件测试

Component|组件       

computation data use|计算数据使用       

computer system security|计算机系统安全性       

Concurrency user      | 并发用户

Condition coverage    | 条件覆盖

condition coverage|条件覆盖       

condition outcome|条件结果        

condition|条件       

configuration control|配置控制       

Configuration item    | 配置项

configuration management|配置管理       

Configuration testing | 配置测试

conformance criterion| 一致性标准       

Conformance Testing| 一致性测试       

consistency        | 一致

  • 0
    点赞
  • 11
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Alansari2017- A Distributed Access Control System for Cloud Federations .pdf Anon2017-Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.pdf Arnautov2016- SCONE Secure Linux Containers with Intel SGX.pdf Atamli-Reineh2015 - Securing Application with Software Partitioning.pdf B2017 -Securing Data Analytics on SGX With.pdf Bahmani2016 - Secure Multiparty Computation from SGX.pdf Barbosa2016- Foundations of Hardware-Based Attested Computation and Application to SGX.pdf Bauman2016-A Case for Protecting Computer Games With SGX.pdf Baumann2014- Shielding applications from an untrusted cloud with Haven-haven.pdf Beekman2016- Attestation Transparency Building secure Internet.pdf BehlJDistlerT2017-Hybrids on Steroids-SGX-Based High Performance BFT∗.pdf Bhardwaj2016-Fast, scalable and secure onloading of edge functions using AirBox.pdf Boneh2017 - Surnaming Schemes, Fast Verification, and Applications to SGX Technology.pdf Brekalo2016-Mitigating Password Database Breaches with Intel SGX.pdf Brenner2017- Secure Cloud Micro Services Using Intel SGX.pdf CacheZoom - how sgx amplifies the power of cache attacks.pdf ChakrabartiSLeslie-HurdRVijM -Architecture for Oversubscription of Secure Memory.pdf ChakrabartiSLeslie-HurdRVijM-Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment .pdf Choi2017 - S-OpenSGX A system-level platform.pdf Costan2016-Sanctum Minimal Hardware Extensions for Strong Software.pdf Coughlin2017 -Trusted Click-Overcoming Security issues of NFV in the Cloud.pdf Dang2017-Proofs of Data Residency-Checking whether Your Cloud Files Have Been Relocated .pdf Elastic and Secure Energy Forecasting in cloud environments.pdf Fetzer2016-Building Critical Applications Using Microservice.pdf Gkantsidis2017- And Then There Were More.pdf Glamdring-Automatic Application Partitioning for Intel SGX.pdf Glimmers-Resolving the Privacy-Trust Quagmire.pdf Gotzfried2017-Cache Attacks on Intel SGX.pdf Gu2017 - Secure Live Migration of SGX Enclaves on Trusted Cloud.pdf Haider2017- Leveraging hw isolation for Process L (2).pdf Han2017-SGX-Box Enabling Visibility on Encrypted Traffic.pdf Hunt2016-Ryoan- A Distributed Sandbox for Untrusted .pdf Hutchison2011-HardIDX_ Practical and Secure Index with SGX.pdf Iron - Functional Encryption using Intel SGX.pdf Jackson2017 -Trust is in the Keys of the Beholder.pdf Jacomme2017 - Symbolic Models for Isolated Execution Environments.pdf KarandeVBaumanELinZ2017-SGX-Log-Securing System Logs With SGX.pdf Kelbert2017 - SecureCloud Secure Big Data Processing in Untrusted Clouds.pdf Leaky Cauldron on the Dark Land.pdf Leslie-Hurd2015-Verifying Linearizability of IntelR Software Guard Extensions.pdf Leveraging Intel SGX to Create a Nondisclosure Cryptographic library.pdf LightBox-SGX-assisted secure network functions.pdf Lind2016 - Teechan - Payment Channels Using TEE.pdf Lind2017 - Teechain-scalable blockchain payments using TEE.pdf Link2016-Automatic Enforcement of Expressive Security Policies using Enclaves.pdf Nguyen2017- EnGarde-Mutually-Trusted Inspection of SGX Enclaves.pdf Ohrimenko2016- Oblivious Multi-Party Machine Learning on Trusted Processors.pdf On Making Emerging TEE Accessible to Developers.pdf Paladi2016-TruSDN_ Bootstrapping Trust in Cloud Network Infrastructure.pdf Pires2016 - Secure Content-Based Routing Using SGX.pdf Pires2017- A lightweight MapReduce framework for secure processing with SGX.pdf Proof of Luck- an Efficient blockchain consensus protocol.pdf rollback and forking detection for trusted execution environments using lightweight (2).pdf Rollback and Forking Detection for Trusted Execution environments using lightweight.pdf SAFETY - Secure gwAs in Federated Environment.pdf Sasy-ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Schuster2015- VC3-Trustworthy Data Analytics in the Cloud using SGX.pdf sec17-lee-jaehyuk.pdf sec17-lee-sangho.pdf sec17-van_bulck.pdf Seitzer2015-A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.pdf Seo2017 - SGX-Shield -Enabling Address Space Layout Randomization for SGX Programs.pdf Shepherd2017a- Secure and Trusted Execution-Past .pdf Shinde2015 - Preventing Page Faults from Telling Your Secrets.pdf Sinha2015- Moat Verifying Confidentiality of Enclave Programs.pdf Stewin2016 - Malware Guard Extension_ Using SGX to Conceal Cache Attacks.pdf Strackx2016-Developing Secure SGX Enclaves New Challenges on the Horizon.pdf Strackx2016a - Ariadne-A Minimal Approach to State Continuity.pdf Swami2017 - Intel SGX Remote Attestation is not sufficient.pdf Tamrakar2017-The Circle Game-Scalable Private Membership Test Using Trusted Hardware.pdf Tramer2016 - Sealed-Glass Proofs.pdf Tsai2017 -Graphene-SGX.pdf Tychalas2017-SGXCrypter.pdf Volp2016-Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control .pdf Weichbrodt2016-AsyncShock - Exploiting Synchronisation Bugs in Intel SGX Enclaves.pdf Weiser2017 - SGXIO- Generic Trusted IO Path for Intel SGX.pdf Weisse2017 - Regaining Lost Cycles with HotCalls.pdf XingBCShanahanM2016-Intel__ Software Guard Extensions (Intel__ SGX) Software Support for Dynamic Memory Allocation inside an Enclave.pdf Xu2015-Controlled-Channel Attacks_ Deterministic Side Channels for Untrusted Operating Systems.pdf ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Zhang2016 - Town Crier.pdf Zhang2017-REM Resource-Efficient Mining for Blockchains.pdf

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值