{"title":"The Visionary Track on Engineering Mobile Service Oriented Systems","authors":"Nour Ali, R. Bahsoon, I. Gorton","doi":"10.1109/SERVICES.2015.23","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.23","url":null,"abstract":"The IEEE Engineering Mobile Service Oriented Systems (EMSOS) Workshop aims to bring together researchers from academia and industry, as well as practitioners in the area of engineering services in mobile environments in order to provide a forum where recent research results can be presented and discussed. The objective is to understand open issues in the software engineering area of services applied in mobile environments, and to build a community of researchers and practitioners willing to collaborate on these issues.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Campos, Rúbens de Souza Matos Júnior, P. Maciel, Igor Costa, Francisco Airton Silva, F. Souza
{"title":"Performance Evaluation of Virtual Machines Instantiation in a Private Cloud","authors":"E. Campos, Rúbens de Souza Matos Júnior, P. Maciel, Igor Costa, Francisco Airton Silva, F. Souza","doi":"10.1109/SERVICES.2015.55","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.55","url":null,"abstract":"Elasticity is an outstanding concept of cloud computing, usually deployed through mechanisms such as auto scaling and load balancing. Cloud-based applications are able to adapt themselves dynamically to the workload behavior due to such mechanisms. The efficient instantiation of Virtual Machines (VMs) is one requirement for the elastic behavior of cloud-based applications. This study characterizes the performance of VM instantiation in a private cloud platform, considering distinct factors such as VM type, VM image size, and VM caching. We employed a full factorial design of experiments (DoE) to compute the effect and relevance of the factors as well as their interactions. Our experimental results show that the cache factor has an impact of 45.07 % on the total instantiation time, whereas the machine image (MI) has 26.45 % and the VM type only 1.05 %. The results of these experiments are also used as input parameters in a Markov chain model for sensitivity analysis. The model evaluation showed that for 6 GB and 8 GB MI, the probability of finding the MI on cache must be at least 40 % and 60 % respectively, to achieve an average instantiation time of 300 seconds. For MI with size 2 GB, such time is not exceeded even with the cache disabled. This analysis allows checking the impact of every parameter on the system response time and pointing out effective ways for improvement of performance. Such conclusions may be used as decision support for systems which often instantiate new VMs, including those using elasticity features, such as auto scaling.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131732377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Darl Kolb, Koteswara Ivaturi, Sarah Henderson, A. Srinivasan
{"title":"Managing Ubiquitous Connectivity: Mobile Media Flow Service Systems","authors":"Darl Kolb, Koteswara Ivaturi, Sarah Henderson, A. Srinivasan","doi":"10.1109/SERVICES.2015.25","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.25","url":null,"abstract":"Ubiquitous connectivity has fostered an unprecedented wave of mobile computing and communication applications. As the number of mobile applications grows exponentially, a crucial issue is how users will monitor and manage their media 'flows' to optimal levels. This means having 'requisite' levels of information and communication, while avoiding states of hyper-connectivity. Our research is focused on developing mobile applications that analyze users' multiple media flows. A dashboard interface then offers feedback to the user, who can adapt and modify her or his behavior for improved productivity and personal well-being.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection","authors":"M. Salas, P. Geus, E. Martins","doi":"10.1109/SERVICES.2015.53","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.53","url":null,"abstract":"A Web Service is a software system designed to support interoperable machine-to-machine interaction over a network, it also provides a standard means of interoperating between different software applications. However, Web Services have raised new challenges on information security, this technology is susceptible to XML Injection attacks, which would allow an attacker to collect and manipulate information to insert malicious code in either server-side or client-side, being one of the most employed attack against web applications according to the OWASP Top 10. Different studies have shown that the current testing techniques -- penetration testing and fuzzy scanning -- generate several false positives and negatives. However, the fault injection technique improve the robustness of web applications, through the greater flexibility to modify the test cases and to find software bugs. This work describes a fault injection technique for the evaluation of Web Services robustness with WS-Security (Username Token) and the development of a set of rules for vulnerability analysis, resulting on the improvement of the vulnerability detector accuracy. Our results show that 82% of web Services tested were vulnerable to XML Injection attacks.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Contexts Acquisition with High Accuracy and Efficiency","authors":"Jae Yoo Lee, Soo Dong Kim","doi":"10.1109/SERVICES.2015.10","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.10","url":null,"abstract":"Context aware services provide functionalities which are personalized for their users' current situations. A main concern of context-aware services is a substantial consumption of resources while preserving a minimal level of accuracy. There is a tradeoff between efficiency and accuracy on context acquisition. Hence, we propose a cloud-based Context Acquisition Platform to provide a high-level of efficiency over a certain level of accuracy required by a context-aware service. The platform mediates between context-aware services and sensors. With the platform, the context acquisition is only done by it and the context values are shared by multiple context-aware services, which can substantially reduce the cost to acquire context so that efficiency can be largely increased.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129830082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study of Web API Evolution","authors":"S. Sohan, C. Anslow, F. Maurer","doi":"10.1109/SERVICES.2015.43","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.43","url":null,"abstract":"When applications are integrated using web APIs, changes on a web API may break the dependent applications. This problem exists because old versions of the APIs may no longer be supported, a lack of adequate documentation to upgrade to a newer version, and insufficient communication of changes. In this paper we conducted a case study of evolving Web APIs to investigate what changes are made between versions and how the changes are documented and communicated to the API users. The findings are a list of recommendations for practitioners and researchers based on API change profiles, versioning, documentation and communication approaches that are observed in practice. This study will help inform developers of evolving Web APIs to make decision about versioning, documentation and communication methods.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Filling Values to Services: A Road Map","authors":"Shaohua Wang, Ying Zou, J. Ng, Tinny Ng","doi":"10.1109/SERVICES.2015.48","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.48","url":null,"abstract":"It is common for users to explicitly or implicitly compose on-line services to accomplish daily tasks, such as shopping for a pair of shoes on-line. However, unnecessary and repetitive data typing into the services would negatively impact the user experience and decrease the efficiency of service composition. Recent studies have proposed several approaches to help users fill in values to services automatically. However, existing approaches suffer the following two drawbacks: 1) poor accuracy of filling values to services, 2) not designed for service composition. In this position paper, we first present the recent approaches improving the process of filling values to services. We then present our recent achievements and results of using our proposed approaches to help users fill values to services. Lastly, we discuss the various opportunities and challenges in the research field of filling values to services.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Policy Synthesis in Mobile Systems","authors":"Peter Amthor, Winfried E. Kühnhauser","doi":"10.1109/SERVICES.2015.36","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.36","url":null,"abstract":"Contemporary mobile devices have become universal and versatile tools that increasingly are used in sensitive application scenarios. They inevitably carry confidential information such as passwords, encryption keys, mission-critical company data, or location information in combat areas. In order to meet sophisticated security requirements, recent technology focuses on policy-oriented approaches that allow for the definition and enforcement of rigorous and precise rules for protecting confidential information. State-of-the-art development of security policies is a critical process, because of the involved quality assurance measures, it is quite heavy-weighted and tends to antagonize the distinguished virtues of mobile devices for lightweight, spontaneous communication and cooperation. This paper presents an approach to support secure, mobile device based cooperation in temporary, sporadically and spontaneously fashioned cliques within open communication infrastructures. The approach is based upon light-weight security domains protected by security policies that are dynamically and automatically composed during group formation. Due to the volatile nature of such groups simplicity, adaptability, efficiency and compatibility with today's security policy implementation techniques have been a major design goal.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. K. Villanes, Erick Alexandre Bezerra Costa, A. C. Dias-Neto
{"title":"Automated Mobile Testing as a Service (AM-TaaS)","authors":"I. K. Villanes, Erick Alexandre Bezerra Costa, A. C. Dias-Neto","doi":"10.1109/SERVICES.2015.20","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.20","url":null,"abstract":"Due high popularization of cloud services and the use of a wide range of mobile devices with different environments and platforms, a new model to offer software test service emerged, called Testing as a Service (TaaS). It uses cloud infrastructure to provide on-demand testing services on cloud for end users at any time. Nowadays there are many studies about different services about TaaS. Based on this scenario, we propose a framework, called Automated Mobile Testing as a Service (AM-TaaS), which offers automated test for mobile applications based on AQuA's test criteria. We performed an experiment emulating nine Android mobile devices with different characteristics in order to test the criterion \"OTA Install\" (automated installation of mobile applications in a device). We emulated devices under virtual machines and cloud infrastructure. Experimental results show 100% of the emulated devices could be tested using automated test cases designed in the framework for this test criterion.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Detection of Plagiarism in Scientific Documents","authors":"Meiko Jensen, Nils Gruschka","doi":"10.1109/SERVICES.2015.34","DOIUrl":"https://doi.org/10.1109/SERVICES.2015.34","url":null,"abstract":"Scientific documents need to be checked for plagiarism before publication. On the other hand, authors do not want to reveal their document's contents prior to successful publication. In this paper, we propose a novel approach for plagiarism detection in scientific digital libraries, which does not reveal contents of unpublished documents, but allows for early detection of plagiarism attempts. Based on the popular PDF document format, we illustrate the technical feasibility of our approach in detail.","PeriodicalId":106002,"journal":{"name":"2015 IEEE World Congress on Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130900946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}