Cohesion-Driven Decomposition of Service Interfaces without Access to Source Code

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transparency and Access to Source Code in Electronic Voting

We examine the potential role of source code disclosure and open source code requirements in promoting technical improvements and increasing transparency of voting systems. We describe the “enclosure of transparency” of voting technology that has occurred over the course of United States’ electoral history, the implications that source code disclosure has for transparency, the negative effects ...

متن کامل

Transparency and Access to Source Code in Electronic Voting

We examine the potential role of source code disclosure and open source code requirements in promoting technical improvements and increasing transparency of voting systems. We describe the “enclosure of transparency” of voting technology that has occurred over the course of United States’ electoral history, the implications that source code disclosure has for transparency, the negative effects ...

متن کامل

A Strategy to Improve Component Testability without Source Code

A software component must be tested every time it is reused, to guarantee the quality of both the component itself and the system in which it is to be integrated. To reduce testing costs, we propose a model to build highly testable components by embedding testing and monitoring mechanisms inside them. The approach is useful to component developers, who can use these built-in test capabilities i...

متن کامل

Service Management Using the Application Response Measurement API Without Application Source Code Modification

A key challenge facing IT Manager's is the measurement and management of end user response times. The ARM API provides a mechanism for addressing this key Service Management issue by the instrumentation of application code with response time markers. The availability of the ARM API has not, however, solved this problem for the many thousands of applications where source code changes are not pos...

متن کامل

SQLPrevent: Effective Dynamic Detection and Prevention of SQL Injection Attacks Without Access to the Application Source Code

This paper presents an effective approach for detecting and preventing known as well as novel SQL injection attacks. Unlike existing approaches, ours (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not need training traces, (4) does not require modification of the runti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Services Computing

سال: 2015

ISSN: 1939-1374

DOI: 10.1109/tsc.2014.2310195