Nowadays, with the prevalence of Web applications, more and more services and information are available over the Internet while their correctness, security and reliability are often crucial to the success of business ...
详细信息
Service composition is an important means for integrating the individual Web services to create new value added systems that can satisfy complex requirements. However, it is a challenge to analyze security requirement...
详细信息
Regression testing is a hot research area for Web service composition, which has direct impact on QoS of applications. This paper proposes an aspect-oriented regression test technique for analyzing functionalities of ...
详细信息
ISBN:
(纸本)1891706292
Regression testing is a hot research area for Web service composition, which has direct impact on QoS of applications. This paper proposes an aspect-oriented regression test technique for analyzing functionalities of service composition. An extended version of Petri net is proposed as the underlying formalism. Services and components are modeled by Petri nets, service evolution is specified as crosscutting concerns, and in turn woven into the testing model of service composition by following weaving rules. A regression testing algorithm of service composition is designed. Theories of Petri nets help prove the effectiveness of the testing method. A case study shows that the approach simplifies the process of testing, and improves its efficiency as well.
In this paper, we propose a test generation method that combines compositional reasoning theory and counterexample guided abstraction refinement framework. Firstly, the abstract model of system is produced by composin...
详细信息
In this paper, we propose a test generation method that combines compositional reasoning theory and counterexample guided abstraction refinement framework. Firstly, the abstract model of system is produced by composing abstract components, then the abstract test cases can be generated by model checking based on abstract model, finally, the concrete test case of the complete original system is generated by refining the abstract model. The abstraction refinement keeps the state space small enough to alleviate the state space explosion problem.
As a graphical and mathematical modeling tool, CPN (Colored Petri Net) is often used to describe the transition of states for an information system. The advantage of CPN model is that the model can be simulated dynami...
详细信息
TCPNIA (Timed Colored Petri Nets with Inhibitor Arcs, TCPNIA) is a model for specifying real-time embedded systems. It integrates features of colored Petri nets, timed Petri nets and inhibitor arcs. The methods for mo...
详细信息
Test case is one of the most important part of softwaretesting. Reusing available test cases is an effective means to reduce the cost and improve the efficiency of softwaretesting. In order to efficiently reuse test...
详细信息
Test case is one of the most important part of softwaretesting. Reusing available test cases is an effective means to reduce the cost and improve the efficiency of softwaretesting. In order to efficiently reuse test cases, a unified and standard format to describe test cases is needed. Therefore, this paper presents a reusing method based on ontology. The test case ontology is created by Protege Ontology Editor and described by OWL (Web Ontology Language). At last, an example to illustrate the application of this method is to be discussed.
UPnP is a universal plug and play technology which is widely used in the digital family network. The UPnP security ceremonies expend the UPnP technology to meet the important security requirement. This paper introduce...
详细信息
UPnP is a universal plug and play technology which is widely used in the digital family network. The UPnP security ceremonies expend the UPnP technology to meet the important security requirement. This paper introduces a formal method named the Petri Net, using its advantage such as intuitive graphical representation and rigorous mathematical theory to model the security control of the UPnP security ceremonies. This paper simulates the security control in actual security system, using occurrence step and transition sequence of Petri Net model to analyze the accessibility of model and verify the non-repudiation and security of system.
The development of mobile computing is dependent on the new methods, techniques and tools to support engineering applications during all the phases of its life cycle. Especially, considering the complexities of intera...
详细信息
The development of mobile computing is dependent on the new methods, techniques and tools to support engineering applications during all the phases of its life cycle. Especially, considering the complexities of interaction protocol, a communication failure can cause high economic losses. The challenge problems to be solved include: 1) guarantee such critical behaviors as communication reliable, and 2) support the dynamic reconfiguration in case some required services may become unavailable when an interaction is executed at runtime phase, both of which belongs to the scope of the reliability problem of interactive behaviors. This paper will perform the automated verification to ensure high reliability of mobile computing using model checking technique. For this purpose, an approach to modeling the interactive behaviors is proposed by using TS model (Transition Systems model, TS model). The reliability properties, including liveness, safety and reachability, are expressed into the temporal logic formulae, namely, CTL (Computation Tree Logic, CTL). Then the reliability verification for our proposed model of interactive behaviors (TS-mc model) is performed in model checker NuSMV. A prototype system is also discussed, and the experimental results show the significant advantage of our method.
Cloud computing has become an emerging new computing paradigm. However, the issue of providing complex enterprise product family cloud is not well addressed so far. This article presents a framework featuring an in-de...
详细信息
暂无评论