Cohesion-Driven Decomposition of Service Interfaces without Access to Source Code
نویسندگان
چکیده
منابع مشابه
Transparency and Access to Source Code in Electronic Voting
We examine the potential role of source code disclosure and open source code requirements in promoting technical improvements and increasing transparency of voting systems. We describe the “enclosure of transparency” of voting technology that has occurred over the course of United States’ electoral history, the implications that source code disclosure has for transparency, the negative effects ...
متن کاملTransparency and Access to Source Code in Electronic Voting
We examine the potential role of source code disclosure and open source code requirements in promoting technical improvements and increasing transparency of voting systems. We describe the “enclosure of transparency” of voting technology that has occurred over the course of United States’ electoral history, the implications that source code disclosure has for transparency, the negative effects ...
متن کاملA Strategy to Improve Component Testability without Source Code
A software component must be tested every time it is reused, to guarantee the quality of both the component itself and the system in which it is to be integrated. To reduce testing costs, we propose a model to build highly testable components by embedding testing and monitoring mechanisms inside them. The approach is useful to component developers, who can use these built-in test capabilities i...
متن کاملService Management Using the Application Response Measurement API Without Application Source Code Modification
A key challenge facing IT Manager's is the measurement and management of end user response times. The ARM API provides a mechanism for addressing this key Service Management issue by the instrumentation of application code with response time markers. The availability of the ARM API has not, however, solved this problem for the many thousands of applications where source code changes are not pos...
متن کاملSQLPrevent: Effective Dynamic Detection and Prevention of SQL Injection Attacks Without Access to the Application Source Code
This paper presents an effective approach for detecting and preventing known as well as novel SQL injection attacks. Unlike existing approaches, ours (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not need training traces, (4) does not require modification of the runti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Services Computing
سال: 2015
ISSN: 1939-1374
DOI: 10.1109/tsc.2014.2310195