29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

筛选
英文 中文
Component security - issues and an approach 组件安全-问题和方法
N. Nissanke
{"title":"Component security - issues and an approach","authors":"N. Nissanke","doi":"10.1109/COMPSAC.2005.58","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.58","url":null,"abstract":"Security vulnerabilities posed by third-party software components in component based development (CBD) is a serious impediment to its adoption in areas that offer great economic potential, particularly in areas such as embedded software and large-scale enterprise software. They raise questions about reliability and integrity of components, as well as the risks posed by any malicious code. This paper is a discussion of factors that affect component security and ways of assuring component security. Using a simplified model of sendmail, it also outlines a formal framework that fits in with communicating sequential processes (CSP) for modelling and analysis of component security.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Iterative Metamorphic Testing 迭代变形测试
Peng Wu
{"title":"Iterative Metamorphic Testing","authors":"Peng Wu","doi":"10.1109/COMPSAC.2005.93","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.93","url":null,"abstract":"An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted within an integrated testing environment MTest, shows that n-iterative metamorphic testing exceeds metamorphic testing and special case testing in terms of their fault detection capabilities. Another advantage of n-iterative metamorphic testing is its high efficiency in test case generation.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Software reliability growth model considering testing profile and operation profile 考虑测试剖面和运行剖面的软件可靠性增长模型
Jing Zhao, Hongwei Liu, G. Cui, Xiaozong Yang
{"title":"Software reliability growth model considering testing profile and operation profile","authors":"Jing Zhao, Hongwei Liu, G. Cui, Xiaozong Yang","doi":"10.1109/COMPSAC.2005.142","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.142","url":null,"abstract":"The testing and operation environments may be essentially different, thus the fault detection rate (FDR) of testing phase is different from that of the operation phase. In this paper, based on the representative model, G-O model, of nonhomogeneous Poisson process (NHPP), a transformation is performed between the FDR of the testing phase to that of the operation considering the profile differences of the two phases, and then a software reliability growth model (SRGM) called TO-SRGM describing the differences of the FDR between the testing phase and the operation phase is proposed. Finally, the parameters of the model are estimated using the least squares estimate (LSE) based on normalized failure data. Experiment results show that the goodness-of-fit of the TO-SRGM is better than that of the G-0 model and the PZ-SRGM on the normalized failure data set.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127135863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adapting single-request/multiple-response messaging to Web services 使单请求/多响应消息传递适应于Web服务
Michael Ruth, Feng Lin, S. Tu
{"title":"Adapting single-request/multiple-response messaging to Web services","authors":"Michael Ruth, Feng Lin, S. Tu","doi":"10.1109/COMPSAC.2005.39","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.39","url":null,"abstract":"In this paper, we will focus on providing a solution to using the message exchange pattern, single-request/multiple-response (SRMR) in the context of Web services and secured enterprise environments. SRMR messaging is important because it can be used to model real world problems elegantly. However, SRMR messaging is not directly supported by Web services, and is hampered by current in-practice security schemes, such as firewalls and proxy servers. We have proposed a client-side framework to utilize SRMR Web services with the realities of network security in mind. The central component of our framework is a Web service clearinghouse, which serves as both a communication proxy and a message manager that realizes the correlation between clients' calls and the services' responses. Using our framework and the code generation utilities, we have implemented a number of nontrivial systems that use SRMR Web services.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Agent oriented programming based on SLABS 基于slab的面向Agent的编程
Ji Wang, R. Shen, Hong Zhu
{"title":"Agent oriented programming based on SLABS","authors":"Ji Wang, R. Shen, Hong Zhu","doi":"10.1109/COMPSAC.2005.41","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.41","url":null,"abstract":"SLABS is a formal specification language designed for modular and composable specification of multi-agent systems. This paper reports our attempts to support SLABS at the level of programming languages. A programming language, SLABSp, is presented to support two distinguished mechanisms, namely caste and scenario, in caste-centric methodology of agent-oriented software development. Based on Java platform, the SLABSp has been implemented by compiling the programs into Java with the multi-agent runtime environment.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A tool and case study for specification-based program review 基于规范的程序审查的工具和案例研究
Fumiko Nagoya, Shaoying Liu, Yuting Chen
{"title":"A tool and case study for specification-based program review","authors":"Fumiko Nagoya, Shaoying Liu, Yuting Chen","doi":"10.1109/COMPSAC.2005.36","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.36","url":null,"abstract":"Effective tool support is crucial for successfully applying software review techniques in practice. In this paper, we describe the design and implementation of a software tool to support an approach to reviewing programs on the basis of their formal specifications. The approach was initially proposed in our previous publication to improve the rigor, repeatability, and effectiveness of existing code review methods. We also present a case study in which we reviewed an ATM system to assess the performance of the review approach when used with the software tool. The results of the case study show that the approach is effective in detecting errors in programs and the tool is helpful in enhancing the efficiency of the review process.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protecting users against phishing attacks with AntiPhish 使用AntiPhish保护用户免受网络钓鱼攻击
E. Kirda, Christopher Krügel
{"title":"Protecting users against phishing attacks with AntiPhish","authors":"E. Kirda, Christopher Krügel","doi":"10.1109/COMPSAC.2005.126","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.126","url":null,"abstract":"Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, 51 million US Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed Web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a Web site that is considered un-trusted.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 169
A framework for efficient contract-based testing of software components 一个有效的基于契约的软件组件测试框架
E. Valentini, Gerhard Fliess, Edmund Haselwanter
{"title":"A framework for efficient contract-based testing of software components","authors":"E. Valentini, Gerhard Fliess, Edmund Haselwanter","doi":"10.1109/COMPSAC.2005.24","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.24","url":null,"abstract":"Component based frameworks become more and more state-of-the art but without verifying the components and their interaction it is nearly impossible to build correct and robust systems. Testing of such systems requires a combination of unit- and integration tests, and must deal with verifying the contracts that enables the interaction of components. In this article we present CrashIt - a test framework for component-based testing. A main concept of CrashIt is the introduction of expandable contract-checkers that verify the communication between a client and a supplier component. These checkers are able to communicate with each other and with other modules of CrashIt. Thus, CrashIt is able to check the state of each component at every time.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A control approach for agile processes 敏捷过程的控制方法
João W. Cangussu, R. Karcich
{"title":"A control approach for agile processes","authors":"João W. Cangussu, R. Karcich","doi":"10.1109/COMPSAC.2005.18","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.18","url":null,"abstract":"Agile processes can provide early defect information on all the stages of the development process. The use of a feedback control model to regulate the process based on this information is proposed here. The model was originally designed to regulate the testing process and has proven to be effective. Additionally, an ODC filter is proposed to properly interconnect the models associated with each development phase. The approach appears to be a reasonable solution for the control and prediction of agile processes.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards describing black-box testing methods as atomic rules 将黑盒测试方法描述为原子规则
T. Murnane, R. Hall, K. Reed
{"title":"Towards describing black-box testing methods as atomic rules","authors":"T. Murnane, R. Hall, K. Reed","doi":"10.1109/COMPSAC.2005.157","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.157","url":null,"abstract":"Ideally, all black-box testing methods should be interpreted in the same way by different testers. In reality however, inconsistencies and ambiguities in original method descriptions may lead to differing interpretations and varying test set quality. In this paper, we decompose these methods into atomic rules for selecting test data and constructing test cases. We validate the rules via a worked example and discuss a pilot experiment to determine whether atomic rules are simpler to learn and use. Our approach also enables method tailoring and may simplify method comparison.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信