Preview

Collaborative Testing of Web Services

Good Essays
Open Document
Open Document
13378 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Collaborative Testing of Web Services
116

IEEE TRANSACTIONS ON SERVICES COMPUTING,

VOL. 5,

NO. 1, JANUARY-MARCH 2012

Collaborative Testing of Web Services
Hong Zhu, Member, IEEE Computer Society, and Yufeng Zhang
Abstract—Software testers are confronted with great challenges in testing Web Services (WS) especially when integrating to services owned by other vendors. They must deal with the diversity of implementation techniques used by the other services and to meet a wide range of test requirements. However, they are in lack of software artifacts, the means of control over test executions and observation on the internal behavior of the other services. An automated testing technique must be developed to be capable of testing on-the-fly nonintrusively and nondisruptively. Addressing these problems, this paper proposes a framework of collaborative testing in which test tasks are completed through the collaboration of various test services that are registered, discovered, and invoked at runtime using the ontology of software testing STOWS. The composition of test services is realized by using test brokers, which are also test services but specialized in the coordination of other test services. The ontology can be extended and updated through an ontology management service so that it can support a wide open range of test activities, methods, techniques, and types of software artifacts. The paper presents a prototype implementation of the framework in semantic WS and demonstrates the feasibility of the framework by running examples of building a testing tool as a test service, developing a service for test executions of a WS, and composing existing test services for more complicated testing tasks. Experimental evaluation of the framework has also demonstrated its scalability. Index Terms—Software engineering, software testing, distributed/internet based software engineering tools and techniques, testing tools, ontology, web services, semantic web services, service composition.

Ç
1

You May Also Find These Documents Helpful

  • Good Essays

    Function Test to exercise the processing logic of the system to expose errors in data base updates, calculations and edits and to ensure that the system delivers all functionality described in the Preliminary Design…

    • 960 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    2. in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Air Force IT Remedy System

    • 1457 Words
    • 6 Pages

    Information Technology (IT) Service Management is the framework and imbedded processes by which an IT organization both manages the services it provides and delivers those services to customers (Drogseth, 2015). There are many different approaches to Service Management but its overall effectiveness is the lifeblood of any IT organization. The United States Air Force utilizes the Remedy system to automate Service Management functions for its cyber enterprise networks. Remedy provides the various system users multiple features to streamline and optimize their respective Service Management functions. Without careful planning there are some problems Remedy can create; however, when utilized properly the system provides users with a powerful Service Management tool. Identifying the users who interface with Remedy is the first step to understanding its importance to Air Force IT organizations.…

    • 1457 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    BSA 411 Complete Class

    • 1208 Words
    • 8 Pages

    • Scheibler, et al. (2008) developed a software application integration product delivered as a service (SaaS). Discuss how you can use this service, specifically to speed up…

    • 1208 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Coupling metrics: It provides an indication of the "connectedness" of a module to other modules…

    • 431 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Anno

    • 2217 Words
    • 9 Pages

    Even though modern helmets protect the skull in football, the helmets do not protect the brain from concussions and others injuries such as spinal injuries because the hard shell of the helmet creates a harder impact and allows people to feel comfortable leading with their head to make contact with another player, a softer shelled helmet, a helmet with extra padding or no helmet at all would lower such impacts and chances of concussions as well as lowering chances of players leading with their head on a tackle.…

    • 2217 Words
    • 9 Pages
    Good Essays
  • Best Essays

    Is3220 Term Paper

    • 2446 Words
    • 10 Pages

    References: Abdallah Namoune, Usman Wajid, Nikolay Mahendjiev. “Composition of Interactive Service-based Applications by End Users”. ICSOC/ServiceWave Workshops, Stockholm, Sweden, 2009…

    • 2446 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    A relatively new term that has been introduced to the Web environment is Web service. What is a Web service and how does it differ from the concept of a Web application?…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Service-Oriented Architecture (SOA) is a business approach to provide the ability for a business to use and integrate new and existing Information Technology (IT) systems. Additionally, Service-Oriented Architecture allows the business to adapt to changes in each system, as long as the system continues to adhere to the Service-Oriented Architecture. Once the business IT systems are brought under the Service-Oriented Architecture umbrella, any one component can be modified, to repair a software defect in a calculation, for example, and the…

    • 881 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    the future lies in software as a service.With far reaching advantages for the buissiness and the…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    service oriented architecture or an “SOA.” It is a newer kind of system that will allow…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    Penetration testing has been well popularized by the media. Many companies are now offering penetration services to identify vulnerabilities in systems and the surrounding processes. This report will Discuss "Penetration Testing" as a means of strengthening a corporate network's security. This report is divided into three parts. Introduction will give you a brief and basic overview of Penetration Testing and why we need Penetration Testing, The second part is the technical breakdown explains The strategy, model and type of Penetration Testing. In the conclusion, we will discuss both the value and limitation of Penetration Testing.…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Highly skilled Senior Test Analyst with more than 25 years experience in technology, and extensive capability across System, Software and Integration Testing, SDLC testing processes, Quality Assurance, and Independent Validation & Verification (IV&V;). Expert in defining test plans, test specifications, test scripts, test strategy, defect tracking and reporting system management. Outstanding knowledge and use of quality management methods to create and support defect-free, application software that meets the needs of the project. Strong focus on automation and process improvement. Skilled leader of staff.…

    • 1130 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cost Estimation

    • 2353 Words
    • 10 Pages

    Software Acquisition Best Practices Education and Training Experts FAQs, Glossary, and Acronyms Literature Programs and Organizations Related Resources Service Providers/Consultants Standards, Policies, and Procedures Tools Acquisition Community Connection (ACC) Defense Acquisition University DoD-specific Acquisition Performance-based Services Acquisition (PBSA) SEI Software Acquisition Capability Maturity Model (SA-CMM) Software Outsourcing Agile Development Case Studies Discussion Groups/List Servers/Blogs Education and Training Experts FAQs, Glossary, and Acronyms Literature Programs and Organizations Related Resources Service Providers/Consultants Tools Agile Project Management Agile Testing Forge.mil SCRUM Cloud Computing Case Studies Discussion Groups/List Servers/Blogs Education and Training Experts Literature Programs and Organizations Service Providers/Consultants Standards, Policies, and Procedures Cloud Computing News Cloud Computing Security Cloud Testing Conferences and Symposiums Cyber Security…

    • 2353 Words
    • 10 Pages
    Powerful Essays

Related Topics