S. Rugaber, Nissim Harel, Srihari Govindharaj, Dean F. Jerding
{"title":"Problems Modeling Web Sites and User Behavior","authors":"S. Rugaber, Nissim Harel, Srihari Govindharaj, Dean F. Jerding","doi":"10.1109/WSE.2006.16","DOIUrl":"https://doi.org/10.1109/WSE.2006.16","url":null,"abstract":"As the World Wide Web has grown in size and scope, so too has the demand for analysis tools that can help Web site providers determine how their sites are being used. Early analysis approaches focused primarily on accesses to Web documents as recorded in Web server logs. More recent techniques create a model of a site, and the natural modeling approach is to use a directed graph, where pages are denoted by nodes and links are modeled by edges. The process of creating the model and then analyzing the corresponding visitor traffic, however, is fraught with difficulties. The contribution of this paper is a catalog of problems gathered from extensive experience modeling Web sites to determine site structure and analyze user behavior","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eliminating SQL Injection Attacks - A Transparent Defense Mechanism","authors":"M. Muthuprasanna, Ke Wei, S. Kothari","doi":"10.1109/WSE.2006.9","DOIUrl":"https://doi.org/10.1109/WSE.2006.9","url":null,"abstract":"The widespread adoption of Web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today's Internet infrastructure. Web-based systems comprise both of infrastructure components and of application-specific code. Various organizations have started extensively deploying intrusion detection/prevention systems and Firewalls as a means of securing their vital installations. However, very little emphasis is laid on securing the applications that run on these systems, apart from frequent updates and patching. SQL-injection attacks are a class of attacks that many of these systems are highly vulnerable to, and there is no known fool-proof defense against such attacks. In this paper, we propose a technique, which combines static application code analysis with runtime validation to detect the occurrence of such attacks. The deployment of this technique eliminates the need to modify source code of application scripts, additionally allowing seamless integration with currently-deployed systems. We provide various optimizations improving overall efficiency, and also preliminary evaluation of prototype developed","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114784322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WA-UML: Towards a UML extension for modelling Adaptive Web Applications","authors":"Raoudha Ben Djemaa, Ikram Amous, A. B. Hamadou","doi":"10.1109/WSE.2006.20","DOIUrl":"https://doi.org/10.1109/WSE.2006.20","url":null,"abstract":"In this paper, we propose WA-UML (Web Adaptive Unified Modelling Language); a UML profile for adaptive Web applications (AWA). It increases the expressivity of UML while adding labels and graphic annotations to UML diagrams. This extension of UML defines a set of stereotypes and constraints, which make possible the modelling of AWA. These stereotypes and these constraints are applied in a number of diagrams represented within the same model and on the same diagrams those which describe the system. In this paper we present use case diagram of WA-UML as well as its realization by the analysis class diagram","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Driven Evolution of Network-Centric Applications: Perspectives, Challenges, and Issues","authors":"K. Kontogiannis","doi":"10.1109/WSE.2006.13","DOIUrl":"https://doi.org/10.1109/WSE.2006.13","url":null,"abstract":"Model-driven techniques have been proposed and promoted by the Software Engineering community over the past few years as a mechanism for streamlining the design, implementation and evolution of large software applications. The basic idea behind model-driven techniques is that, design artifacts of large software applications can be represented as a collection of models which can be consequently transformed and evolved to generate specific design artifacts and even source code that complies with specific programmatic paradigms and patterns. Even though model-driven frameworks have caught the attention of the software engineering community as a way to increase programmers' productivity and overall system robustness through the disciplined manipulation and transformation of models and ultimately code generation, they have remained so far only in the form of \"guidelines\" or \"standard practices\". In this respect, important questions regarding to what types of models are required for system representation, how transformations are encoded and enacted, how model constraints are denoted and validated, and how source code is generated, is left to software vendors, software architects and software developers to further design and implement. In this keynote presentation we will focus on the challenges, issues, emerging research topics and practical examples pertaining to the use of model-driven techniques for the design, analysis and evolution of network-centric, web-based applications. Some of these challenges in such systems include the use of multi-language paradigms, the problem of maintaining consistency between various models during system evolution, dealing with underlying technology changes, and facilitating end-product customizability.","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining for Co-Changes in the Context of Web Localization","authors":"Huzefa H. Kagdi, Jonathan I. Maletic","doi":"10.1109/WSE.2006.12","DOIUrl":"https://doi.org/10.1109/WSE.2006.12","url":null,"abstract":"An approach for mining repositories of Web-based user documentation for patterns of evolutionary change in the context of internationalization and localization is presented. Sets of documents that are changed together during the translation process are uncovered and documented to support future evolution of the system. A sequential-pattern mining technique is used to uncover the patterns from Subversion repositories. The approach is applied to the open source KDE system. KDE maintains documentation for over fifty different natural languages and presents a prime example of the problem. Characteristics of the uncovered patterns such as size, frequency, and occurrences within a single language or across multiple languages are discussed. Such patterns help provide insight as to the effort required in retranslation due to a change in the documentation and help user communities estimated the progress of documentation in their respective languages","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121418782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Hiding URLs for EasierWebsite Evolution","authors":"C. Song, Vibha Sazawal","doi":"10.1109/WSE.2006.10","DOIUrl":"https://doi.org/10.1109/WSE.2006.10","url":null,"abstract":"Many common elements of URLs do not adhere to the principle of information hiding. For example, filename extensions and parameter names can reveal volatile implementation details. As a result, when Website implementations change, links between pages break. Bookmarks and code that generates URLs often break as well. In this paper, we present two tools for information-hiding URLs. An information-hiding URL uses an alias to identify a Web resource and appends parameter values into the hierarchical structure of the URL. The InformationHidingFilter uses a Java Servlet filter to facilitate the use of information-hiding URLs with JSP/Servlet Web applications. Given a request, the filter identifies the JSP or Servlet being requested and identifies parameter values contained in the information-hiding URL. Required values not provided in the URL are automatically substituted with default values specified by the Web developer. Thus, old links remain valid even when the Website changes and new parameters have been added to the page. The InformationHidingChecker helps Web developers adhere to information hiding by helping them identify JSPs or Servlets that lack URL information for the InformationHidingFilter or lack default values for parameters. We also discuss the performance cost of using information-hiding URLs","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSDLTest - A Tool for Testing Web Services","authors":"H. Sneed, Shihong Huang","doi":"10.1109/WSE.2006.24","DOIUrl":"https://doi.org/10.1109/WSE.2006.24","url":null,"abstract":"A significant barrier to the use of Web services is the problem of testing them. One of the solutions to deal with the problem lies in the ability to simulate the usage of the services. Requests must be generated and responses must be validated automatically in a fast and reliable manner. To accomplish this goal, we have developed a tool called WSDLTest. WSDLTest is part of a larger complex tool set - DataTest - for generating and validating system test data. The architecture and functionality of this tool, as well as the experience gained from using it, are presented","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-based Program Comprehension Tool Supporting Website Architectural Evolution","authors":"Yonggang Zhang, R. Witte, J. Rilling, V. Haarslev","doi":"10.1109/WSE.2006.15","DOIUrl":"https://doi.org/10.1109/WSE.2006.15","url":null,"abstract":"A challenge of existing program comprehension approaches is to provide consistent and flexible representations for software systems. Maintainers have to match their mental models with the different representations these tools provide. In this paper, we present a novel approach that addresses this issue by providing a consistent ontological representation for both source code and documentation. The ontological representation unifies information from various sources, and therefore reduces the maintainers' comprehension efforts. In addition, representing software artifacts in a formal ontology enables maintainers to formulate hypotheses about various properties of software systems. These hypotheses can be validated through an iterative exploration of information derived by our ontology inference engine. The implementation of our approach is presented in detail, and a case study is provided to demonstrate the applicability of our approach during the architectural evolution of a Web site content management system","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowing Your Online Readership, Organizing Your Communication","authors":"Lorenzo Cantoni","doi":"10.1109/WSE.2006.11","DOIUrl":"https://doi.org/10.1109/WSE.2006.11","url":null,"abstract":"Many times a design choice has a deep impact onto future website management activities, which in their turn mean allocating resources. These choices are to be verified, confirmed or refused not only against design quality and hypotheses, but mostly against actual usages. The actual usages of a website are of the utmost importance to infer and understand interests, goals and styles of users, and are to be interpreted in order to maintain, refine and enhance the website itself. It is neither a one-off nor a one-way path, but a continuous dialogue among different people and stakeholders, requiring endless hypothesizing and testing of hypotheses (e.g.: did they leave that page soon because it wasn't relevant to them, or because they found it so relevant to print it out for further reading? Did they leave the website after accessing that page because their interest was fully satisfied, or because they didn't find anything useful? Is a page seldom accessed because it is not that interesting or because there is a cumbersome navigation? etc.). The answers to those questions force to re-think communication strategies, as well as all other design dimensions. Moreover, an online application yields to many further exchanges, like buying, voting, subscribing, chatting, gambling, reserving, sending emails etc., activities that leave traces offering insights on our readership/users/clients, and need to be interpreted and to feed back into the website maintaining and improving processes.","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Trends and Technology","authors":"S. Tilley","doi":"10.1109/WSE.2006.21","DOIUrl":"https://doi.org/10.1109/WSE.2006.21","url":null,"abstract":"The pace of change in Web trends and technology shows no signs of slowing down - making it increasingly difficult for the average person to keep up. Blogs. Podcasts. Social networks. Ajax. Flex. IPTV. Digg. YouTube. MySpace. All are examples of recent phenomenon that can impact Web site evolution.","PeriodicalId":174396,"journal":{"name":"2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}