2010 IEEE International Conference on Web Services 2010
DOI: 10.1109/icws.2010.17
|View full text |Cite
|
Sign up to set email alerts
|

Timed Extended Invariants for the Passive Testing of Web Services

Abstract: The service-oriented approach is becoming more and more popular to integrate highly heterogeneous systems. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterpriselevel integration. Formal testing of such Web-based technology is a key point to guarantee its reliability. In this paper, we choose a non-intrusive approach based on monitoring to propose a conformance passive testing methodology to check that a composed Web service respects its functional re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…Regression testing is approached considering minimization (Li et al, 2008b) and prioritization (Mei et al, 2009c). Approaches have been proposed to support passive testing (Benharref et al, 2006;Morales et al, 2010;Cavalli et al, 2010). There is also an initial interest in testing dynamic orchestrations (Kattepur et al, 2011;Hummer et al, 2011Hummer et al, , 2013.…”
Section: Classification Of Service Testing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Regression testing is approached considering minimization (Li et al, 2008b) and prioritization (Mei et al, 2009c). Approaches have been proposed to support passive testing (Benharref et al, 2006;Morales et al, 2010;Cavalli et al, 2010). There is also an initial interest in testing dynamic orchestrations (Kattepur et al, 2011;Hummer et al, 2011Hummer et al, , 2013.…”
Section: Classification Of Service Testing Approachesmentioning
confidence: 99%
“…These techniques are: Labeled Transition System (LTS) and extensions (Mei et al, 2009a;Bertolino et al, 2004Bertolino et al, , 2008Frantzen et al, 2008;Bentakouk et al, 2009;Wieczorek et al, 2009Wieczorek et al, , 2010Rabhi, 2012;Escobedo et al, 2010;De Angelis et al, 2010), timed automaton and extensions (Lallali et al, 2008;Morales et al, 2010;Cavalli et al, 2010;Gao and Li, 2011), Stream X-Machine (SXM) (Dranidis et al, 2007;Ramollari et al, 2009;Kourtesis et al, 2010;Dranidis et al, 2010), extensions of FSMs (Benharref et al, 2006;Keum et al, 2006;Dong et al, 2010), finite state automaton (Baldoni et al, 2005), and Web Service Automaton (WSA) (Zheng et al, 2007). The modeling techniques are used to describe the control flow, data flow, timing, and stochastic properties.…”
Section: Modeling Techniquesmentioning
confidence: 99%
“…In these situations, testing can still play a role, but becomes more passive since interaction will be replaced by observation. Formal passive testing is already a well established line of research and extensions of the original frameworks [21,4,2] have dealt with issues such as security and time [24,22,1]. Essentially, in passive testing we have a property and we check that the trace being observed satisfies that property.…”
Section: Introductionmentioning
confidence: 99%
“…Property modeling for monitoring have been defined and adapted from currently used formalisms, some of the works using trace analysis techniques: TIC [50] and TIPS [56] are based on the analysis of, respectively the execution traces of a system and the exchanged commu-nication packets. They aim at determining if real traces of the system respect functional and security requirements.…”
Section: Passive Testingmentioning
confidence: 99%
“…Different techniques for network monitoring exist in the literature and can be based on, for instance, SNMP [68,85], Deep Packet Inspection (DPI) [19] and invariants [56]. DPI is a technique that is used for completely analyzing communication packets (both headers and payloads) and can be useful for security analysis of network traffic and detecting and preventing intrusions (IDPS, Intrusion Detection and Prevention Systems) [52].…”
Section: Passive Testingmentioning
confidence: 99%