{"title":"The lively dock: Web applications as live thumbnails","authors":"J. Miettinen, T. Mikkonen, A. Taivalsaari","doi":"10.1109/WSE.2010.5623581","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623581","url":null,"abstract":"For better or worse, the web browser has become a widely used target platform for software applications. In the era of web-based software, the web browser will serve as the primary user interface for end-user applications. In this paper, we introduce the Lively Dock, a user interface mechanism that can be used to host miniaturized yet active web applications in a web browser. The system is built as an extension to the Lively Kernel, a programming environment that runs inside a web browser without additional plug-in components. The Lively Dock makes it possible to easily manage a large number of simultaneously running web applications, widgets and other visual objects in the web browser. Consequently, the web browser can easily be used as a windowing environment.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web services in a global bank — An enterprise architecture perspective","authors":"Carl F. Worms","doi":"10.1109/WSE.2010.5623577","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623577","url":null,"abstract":"Since its big bang end of the nineties, commercial web service evolution faces continuous technology change, with an even higher rate than software development in general. To manage this evolution in a systematic way is quite a challenge for large global enterprises.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster grids based platform for digital copyright protection","authors":"Franco Frattolillo, F. Landolfi","doi":"10.1109/WSE.2010.5623564","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623564","url":null,"abstract":"While the advances in networking technologies actually enable mobility and ubiquity of access to computing resources located at different administrative domains, the progress in multimedia technologies has created large amounts of digital content that can be purchased and distributed on the Internet. Within this setting, the problem of the copyright protection of digital content has become a well-known research topic. This paper presents the architecture of a web software platform able to implement the copyright protection of digital content based on digital watermarking technology. The platform is structured as a service-oriented architecture composed of a federation of coordinated web entities and service providers which play distinct roles and interact within a trusted environment. Furthermore, the proposed architecture enables service providers to use a specific middleware to exploit the computing resources they need to provide their protection services. In fact, the middleware can aggregate computing resources directly available on the Internet as well as those belonging to multidomain, non-routable networks, thus enabling service providers to build internal computing environments arranged as cluster grids.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128143844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matching demand and offer in on-line provision: A longitudinal study of monster.com","authors":"A. Capiluppi, A. Baravalle","doi":"10.1109/WSE.2010.5623576","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623576","url":null,"abstract":"When considering the jobs market, changes or recurring trends for skilled employees expressed by employers' needs have a tremendous impact on the evolution of website content. On-line jobs sites adverts, academic institutions and professional development “standard bodies” all share those needs as their common driver for contents evolution.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Domenico Amalfitano, A. R. Fasolino, Porfirio Tramontana
{"title":"Techniques and tools for Rich Internet Applications testing","authors":"Domenico Amalfitano, A. R. Fasolino, Porfirio Tramontana","doi":"10.1109/WSE.2010.5623569","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623569","url":null,"abstract":"The User Interfaces of Rich Internet Applications (RIAs) present a richer functionality and enhanced usability than the ones of traditional Web applications which are obtained by means of a successful combination of heterogeneous technologies, frameworks, and communication models. Due to its increased complexity, dynamicity, and responsiveness, testing the user interfaces of an RIA is more complex than testing the user interfaces of a traditional Web application and requires that effective and efficient testing techniques are proposed and validated. In this paper we analyse the most critical open issues in RIA testing automation and propose a classification framework that characterizes existing RIA testing techniques from four different perspectives. Driven by this classification, we present a set of testing techniques that can be used for automatically and semi-automatically generating test cases, for executing them and evaluating their results. Some examples of applying the proposed techniques for testing real Ajax applications will also be shown in the paper.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"172 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regular expressions on the web","authors":"Renáta Hodován, Zoltán Herczeg, Ákos Kiss","doi":"10.1109/WSE.2010.5623572","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623572","url":null,"abstract":"On the web, static pages fade into the past; web sites use server and client-side scripting techniques to improve the user experience. For client-side scripting, JavaScript is by far the most commonly used dynamic language. In these scripts, regular expressions are widely used for several purposes, e.g., for text filtering and form validation. In this paper, we take a closer look at regular expressions on the web. We investigate historical data and determine the trends of the use of regular expressions over time on various web sites. Then, we also take a snapshot of the current status. We find that although regular expressions are being used more and more often, their use is highly repetitive: on the most popular web sites only 4% of the regular expressions are unique. Based on this result, we show that web browsers can cut down regular expression compilation time to the third by applying caching techniques.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation and analysis of malware on websites","authors":"Takeshi Yagi, N. Tanimoto, Takeo Hariu, M. Itoh","doi":"10.1109/WSE.2010.5623567","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623567","url":null,"abstract":"We investigated the distribution of malware on websites by constructing web honeypots carrying vulnerable web applications. With the diffusion of web services caused by the appearance of a new architecture known as cloud computing, a large number of websites have been used by attackers as hopping sites to attack other websites and user terminals. To construct hopping sites, many attackers force victims to download malware by using vulnerabilities in web applications. To protect websites from these attacks, conventional methods, such as using anti-virus software, filter files from attackers using pattern files, which are generated by analyzing conventional malware files collected by security vendors. However, it is difficult to define malware since software files become malicious depending on the situation. In addition, it is difficult to detect malware, which is different from known malware analyzed by security vendors. Recently, variations in malware continue to increase as new types of malware constantly appear. To reveal the actual situation and critical detection ratio of such conventional methods, we investigated the detection ratio of anti-virus software by using malware collected by web honeypots, which collect attacks on websites by using actual vulnerable web applications. Our investigation revealed that anti-virus software fail to detect many malware files, and that traffic patterns to web honeypots are useful for detecting malware files on websites.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bernardi, Marta Cimitile, Damiano Distante, F. Mazzone
{"title":"Web applications design evolution with UWA","authors":"M. Bernardi, Marta Cimitile, Damiano Distante, F. Mazzone","doi":"10.1109/WSE.2010.5623570","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623570","url":null,"abstract":"This paper presents a semi-automatic approach to Web applications design evolution which leverages the Ubiquitous Web Applications (UWA) design framework, a methodology and a set of models and tools for the user-centered design of multi-channels and context-aware Web applications. The approach is based on a two-step redesign process: first a semi-automatic reverse modeling phase analyzes the html pages of the application front-end to abstract a model of the “as-is” design, according to the UWA formalism; second, a forward design phase starts from the recovered models and the (new) requirements available for the application to identify lacks and opportunities of improvements in the “as-is” design and produce the “to-be” version of it. The reverse modeling phase applies clustering and clone detection techniques and is supported by an Eclipse IDE environment. The forward design phase is supported by a set of UWA modeling tools which are built on top of the Eclipse Graphical Editing Framework (GEF) and of the Eclipse Graphical Modeling Framework (GMF) and that allow developers to evolve the recovered models. The results from a concrete case study to assess the validity of the redesign approach are also presented and discussed.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A performance engineering method for web applications","authors":"Marin Litoiu","doi":"10.1109/WSE.2010.5623583","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623583","url":null,"abstract":"Performance engineering for informational and transactional distributed systems must take into account both the development and runtime information about the target system and its environment. At development time, the architects have to choose from many architecture styles and consider all performance requirements across a multitude of workload. At runtime, an Autonomic Manager has to compensate for changing operating and environment conditions not accounted for at the design time and make decisions about changes in architecture so the performance requirements are met. This paper proposes a formal framework, SPAC, for making decisions with regard to a possible set of candidate architectures: usage scenarios are criteria according to which architectures are evaluated; actual performance metrics, such as response time or throughput, are obtained by solving performance models and then matched against the performance requirements; performance requirements are defined by modeling user satisfaction with a utility function. Criteria can be weighted to reflect their importance. The framework can be used both at design and run time.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilingual web sites: Internationalized Domain Name homograph attacks","authors":"Johnny Al Helou, S. Tilley","doi":"10.1109/WSE.2010.5623562","DOIUrl":"https://doi.org/10.1109/WSE.2010.5623562","url":null,"abstract":"Homograph attacks are a very common type of security vulnerability on the Web. The attack aims to hide the domain name origin by switching some letters in the URL. As the Web evolves beyond the traditional base of English-speaking users, this kind of threat will increase significantly with the use of non-Latin scripts in the entire domain name. The recent introduction of Internationalized Domain Names (IDN) country-code Top Level Domains (ccTLDs) adaptation has made this new homograph attack possible. This paper outlines some of the possible security risks from using non-Latin scripts in the domain name, using examples drawn from Arabic, including the confusion from transforming the non-Latin scripts to ASCII compatible Encoding (ACE). The paper describes some of the existing defenses against IDN homograph attacks, such as white listing of domains and algorithmic analysis of the scripts in the URL. A preliminary design for a new client-side approach to the problem is also outlined. The approach focuses on drawing the user's attention to possible threats when browsing a non-Latin Web site. Some of the techniques being considered include Punycode generation and comparison, highlighting confusing letters (including increasing font sizes for Arabic script), and pre-fetching thumbnail images of Web pages. These solutions will not prevent the attack, but they can provide a visual defense to the user in an unobtrusive and easily adoptable manner.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"32 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}