Genetic programming for reverse engineering

M Harman, WB Langdon… - 2013 20th Working …, 2013 - ieeexplore.ieee.org
This paper overviews the application of Search Based Software Engineering (SBSE) to
reverse engineering with a particular emphasis on the growing importance of recent …

Web service slicing: Intra and inter-operational analysis to test changes

A Chaturvedi, D Binkley - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
We introduce Web Service Slicing, a technique that captures a functional subset of a large-
scale web service using an interface slice captured as a WSDL slice (a subset of a service's …

Semantic correctness of dependence-based slicing for interprocedural, possibly nonterminating programs

AN Masud, B Lisper - ACM Transactions on Programming Languages …, 2021 - dl.acm.org
Existing proofs of correctness for dependence-based slicing methods are limited either to
the slicing of intraprocedural programs [2, 39], or the proof is only applicable to a specific …

DAT: Dependency analysis tool for service based business processes

O Bouchaala, M Yangui, S Tata… - 2014 IEEE 28th …, 2014 - ieeexplore.ieee.org
Control and data dependencies represent prominent information for modeling, managing,
testing and optimizing service based business processes (SBPs). BPMN 2.0, as a twofold …

Control and data complexity metrics for web service compositions

C Mao - 2010 10th International Conference on Quality …, 2010 - ieeexplore.ieee.org
Service-oriented architecture has been widely applied to construct new software system or
integrate some legacy applications. Web service technology is the most representative …

Towards a data complexity metric set for web service composition

C Mao - 2011 IEEE 11th International Conference on Computer …, 2011 - ieeexplore.ieee.org
Web services technology and the corresponding software have been widely acknowledged
in recent years. However, some new features of Web service-based software such as …

An end-to-end security model for adaptive service-oriented applications

T Abdellatif, M Bozga - … 2017 Workshops: ASOCA, ISyCC, WESOACS, and …, 2018 - Springer
In this paper, we present E2SM, an End-to-End Security Model and a set of algorithms to
protect data confidentiality in complex adaptive Service-Oriented Applications (SOA) …

E2SM: a security tool for adaptive cloud‐based service‐oriented applications

T Abdellatif - IET Software, 2019 - Wiley Online Library
The issue of security in the distributed system landscape of a service‐oriented architecture
(SOA) is a challenging one. No longer is it limited to a local application or an application …

Sewsec: A secure web service composer using information flow control

H Zorgati, T Abdellatif - … Conference on Risks and Security of …, 2011 - ieeexplore.ieee.org
In this paper, we describe SEWSEC, a Secure Web Service Composer that assists the
system designer to secure his composed Web Services. The system designer can use …

Entropy-based dynamic complexity metrics for service-oriented systems

C Mao, C Xu - 2017 24th Asia-Pacific Software Engineering …, 2017 - ieeexplore.ieee.org
The complexity analysis of service systems is mainly from the static aspect, and the dynamic
complexity measurement has not attracted enough attention yet. In this paper, we attempt to …