The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is inefficient because hackers bypass these checks and directly send malicious data to the server. User input validation thus has to be duplicated from the client-side (HTML pages) to the server-side (PHP or JSP etc.). We present...
With the service-oriented paradigm, some established ways of thinking about software quality and its assurance seem to change. But things do not necessarily become more difficult. Some considerable advancements to traditional ways of quality management can be introduced through the use of service-based systems, leading to largely reduced efforts and increased quality. In this article we identify the...
Service-Oriented Architecture (SOA) is a paradigm that organizes and uses distributed capabilities to bring together a technical solution to a business problem. Despite the large and increasing dependency on SOA by the enterprise, testing SOA systems is still a nascent and immature field. In particular, testing SOA applications from a security perspective is an essential yet underserved activity....
Memory leak can cause performance decrease or even breakdown of computer system. According to the unavailability of COM component, this paper analyses COM component's memory leak mechanism, propose a testing architecture and provide a memory leak detection method based on HOOK technique. This method can locate functions which cause memory leak and get details of the leaking process. The experiment...
The security of mobile operating systems becomes more and more important with the increasing number and increasing use of mobile devices. With the advances in operating systems security new concepts are introduced for increasing the security of current mobile operating systems. This paper introduces a testing system for the platform security architecture (PSA) of the mobile operating system Symbian...
Based on thorough analysis of the characteristics of both C/S and B/S styles, C/S and B/S mixed style is brought forward under the illumination of isomer. By applying C/S and B/S mixed style on software testing platform of reliability and maintainability, it is proved that this style can satisfy more functional requirements of the platform.
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In this paper, we provide an overview of security issues for smartphones and give a...
The following topics are dealt with: software testing; security; formal methods; software process; regression testing; service orientation; software architecture; and software engineering.
The following topics were dealt with: program analysis; models; testing; clone detection and removal; aspect oriented software engineering; maintenance; software architecture; debugging and fault correction; human aspects in software development; refactoring and reuse; security; software defects; software design; software development; pedagogy; software evolution; pedagogy; and curricula and course...
The following topics are dealt with: adaptive computing; architectures; design evolution; distributed systems design; embedded and real-time software systems; formal methods; model-based system design; modeling and analysis of complex systems; product-family models and architectures; reliability, safety, dependability, and security; system on a chip; system assessment, testing, and metrics; verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.