SlideShare une entreprise Scribd logo
1  sur  8
A policy-based evaluation framework
     for Quality and Security in
   Service Oriented Architectures

        V. Casola
        A.R. Fasolino
        N. Mazzocca
        P. Tramontana

        Dipartimento di Informatica e Sistemistica
        Universita' degli Studi di Napoli, Federico II
        Naples, Italy

        {casolav, fasolino, n.mazzocca, ptramont}@unina.it

                                                   1
Current Web Service Scenarios:

• Customers ask for Web Services providing with specified Quality levels;

• Providers are interested to publish both functional and quality characteristics of the
  Web Services they provide;

• Service Level Agreements (SLAs) are contracts between a Customer and a
Provider; they specify the characteristics in terms of performance and security of the
provided services; they are usually expressed by means of free text documents, i.e.
in natural language;

•All these factors represent a wide limit in the formal definition and automatic
evaluation of SLA.




   Models are needed to formally express the Quality of Web
     Services (software quality, QoS, security and so on)
      requested by Customers and offered by 2  Providers
Our Proposal: define a Quality Meta-
                             Model
     Quality Model                       • Quality Characteristic: any quality requirements,
                                         such as Performance, Security, Cost,
            1..n                         Maintainability
     Characteristic +SubCharacteristic
                     0..n
                                         •Characteristics may be arranged in a hierarchy
                0..1                     (Measurable Characteristics are the leaves)
Measurable Characteristic
                                         • Measurable Characteristic: a Quality
             1..n
                                         Characteristic that can directly be measured
       Component

             1..n
                            Quality Characteristic: Efficiency
           1                     oQuality Characteristic: Time Behaviour
   Measurement Unit                  Quality Characteristic: Response Time
                                          •Measurable Quality Characteristic: Average
                                          Response Time
                                               oComponent: Average Response Time Value
                                                Measurement Unit: Seconds
                                               oComponent: Samples Number
                                                Measurement Unit: Natural Number

                                                                         3
Open problem: How a Customer can choose the Web
     Service that better fits his quality requirements?
                                      Service
                                     Provider1


                                                        Quality
             Service                                    Offer 1
            Customer             ?      …

                       Quality        Service
                       Request       Provider n


                                                         Quality
                                                         Offer n




•We propose to formally express Quality as an istance of the
meta-model;
•We adopt a decision framework for Quality evaluation;
•The framework is based on AHP (Analytic Hierarchy
Process) proposed by Saaty.
                                         T.L. Saaty. How to make a decision: the analytic
                                                           4
                                         hierarchy process, European Journal of Operational
                                         Research, 1990. Vol. 48, n.1, Elsevier, pp. 9-26.
The Analytical Hierarchy Process
1.    The decision framework design activity:
     1. Weight Assignment step: the relative importance of the
         characteristics is rated;
     2. Clustering step: for each measurable characteristic, the sets
         of values that will be considered equivalent for the aims of the
         evaluation are defined;
     3. Rating Step: each set is associated to a rating value;

1.    The decision making activity: to compare the quality of an
      offered service (formalised in a Quality Offer Model) against
      requestor needs (formalised in a Quality Request Model)




                                                        5
Step 1: Weight Assignment
     Intensity of Importance and its
                                                                                          Average    Standard    Maximum
              interpretation
                                                                                          Response   Deviation   of Response
   Intensity of             Interpretation                                                Time       Response    Time
                                                                                                     Time
   Importance
                                                                         Average          1          3           7
        1                   Equal Importance                             Response Time
                                                          1. Build the
        3                   Moderate                                     Standard         1/3        1           5
                                                          Comparison
                            Importance                                   Deviation
                                                          matrix         Response Time
        5                   Strong Importance
                                                                         Maximum          1/7        1/5         1
        7                   Very strong                                  Response Time
                            Importance
                                                                                 2. Normalize
        9                   Extreme Importance
                                                                                 The matrix


                                                              Average    Standard        Maximum     Weights
                                                              Response   Deviation       Response
                                                              Time       Response        Time
Characteristic Weights                                                   Time
are assigned by                           Average Response    21/31      15/21           7/13        0.64
comparing their relative                  Time
importance:                               Standard            7/31       5/21            5/13        0.28
        n
                                          Deviation
            m' (i, k )
w(i ) = ∑
                                          Response Time
                       ∀i
       k =1     n                         Maximum             3/31       1/21            1/13        0.07
                                          Response Time                                         6
Step 2: Clustering
Let’s consider the Average Response Time characteristic

 R = Offered_value / Requested_value

                                                    R < 0.5 (very fast response);
     Possible Solutions are                         0.5≤ R <1 (sufficiently fast
     clustered in three levels:                   response);
                                                    1≤ R <2 (quite slow response).

                                   Step 3: Rating
 Intensity of Goodness and its           Ratings are assigned to clusters by
         interpretation                  comparing their relative Goodness
Intensity of    Interpretation
 Goodness                                                 R<0.5      0.5≤R<1        1≤R<2      Rating

     1          Equivalent              R < 0.5              1             3               5    0.63

     3          Moderately              0.5≤R<1             1/3            1               3    0.26
                better                  1≤ R<2              1/5           1/3              1    0.11
     5          Strongly better
     7          Very strongly
                better                                              0.63 if    R < 0.5
                                      Satisfaction                  
     9          Extremely better                           S (R ) = 0.26 if 0.5 ≤ R < 1
                                      Function S(R)                  0.11 if7 1 ≤ R < 2
                                                                    
The Decision Making Activity

The Quality of different Web Services is compared by evaluating:
    1. a Satisfaction Function for each Measurable Characteristic.
    2. a Satisfaction Function for each non-Measurable Characteristic

         S c (request , offer ) =     ∑w
                                    sc∈C ( c )
                                                 sc   S sc (request , offer )



3. the Overall Satisfaction Function:

         S (request , offer ) =          ∑ w S (request, offer )
                                               c c
                                  c∈Characteristic




    The Web Service with the greater
   Satisfaction Function value is chosen
                                                                                8

Contenu connexe

En vedette

2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework Raleigh ISSA
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeDavid Ochel
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security ArchitecturePriyanka Aash
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisPriyanka Aash
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...Puppet
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 

En vedette (20)

2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...
PuppetConf 2016: Security Roadmap: How We Are Helping You When Everything is ...
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 

Similaire à A policy-based evaluation framework for Quality and Security in Service Oriented Architectures

Ahmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhd Ryn
 
Cost of poor quality presentation5
Cost of poor quality presentation5Cost of poor quality presentation5
Cost of poor quality presentation5Imran Jamil
 
Software Quality
Software QualitySoftware Quality
Software Qualitysjavaad
 
The service minded tester
The service minded testerThe service minded tester
The service minded testerJohan Hoberg
 
Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)will wade
 
Gage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesGage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesScott Munger
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practicesfboisvert
 
Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra Pal
 
The Incompleteness Theorem of Performance Measurement in Service Quality
The Incompleteness Theorem of Performance Measurement in Service QualityThe Incompleteness Theorem of Performance Measurement in Service Quality
The Incompleteness Theorem of Performance Measurement in Service QualityColiban Water
 
Flevy.com - Cost Drivers Analysis
Flevy.com - Cost Drivers AnalysisFlevy.com - Cost Drivers Analysis
Flevy.com - Cost Drivers AnalysisDavid Tracy
 
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...extentconf Tsoy
 
How a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessHow a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessIosif Itkin
 
Back Up QA - Session 3
Back Up QA - Session 3Back Up QA - Session 3
Back Up QA - Session 3megha G
 
Measurement and scales
Measurement and scalesMeasurement and scales
Measurement and scalesKaran Khaneja
 
Service recovery
Service recoveryService recovery
Service recoverygkiyoto
 
Delivering service quality and satisfying library customers in a changing env...
Delivering service quality and satisfying library customers in a changing env...Delivering service quality and satisfying library customers in a changing env...
Delivering service quality and satisfying library customers in a changing env...Fe Angela Verzosa
 

Similaire à A policy-based evaluation framework for Quality and Security in Service Oriented Architectures (20)

Ahmad measuremenr reliability and validity
Ahmad measuremenr reliability and validityAhmad measuremenr reliability and validity
Ahmad measuremenr reliability and validity
 
Measurement terms
Measurement termsMeasurement terms
Measurement terms
 
Cost of poor quality presentation5
Cost of poor quality presentation5Cost of poor quality presentation5
Cost of poor quality presentation5
 
Conjoint Analysis
Conjoint AnalysisConjoint Analysis
Conjoint Analysis
 
Software Quality
Software QualitySoftware Quality
Software Quality
 
The service minded tester
The service minded testerThe service minded tester
The service minded tester
 
Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)Outcomes in Occupational Therapy (& Assistive Technology)
Outcomes in Occupational Therapy (& Assistive Technology)
 
Validity
ValidityValidity
Validity
 
Gage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample SlidesGage R&amp;R Measurement Systems Analysis Sample Slides
Gage R&amp;R Measurement Systems Analysis Sample Slides
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practices
 
Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis Deependra pal, amul ppt , factor analysis
Deependra pal, amul ppt , factor analysis
 
The Incompleteness Theorem of Performance Measurement in Service Quality
The Incompleteness Theorem of Performance Measurement in Service QualityThe Incompleteness Theorem of Performance Measurement in Service Quality
The Incompleteness Theorem of Performance Measurement in Service Quality
 
Flevy.com - Cost Drivers Analysis
Flevy.com - Cost Drivers AnalysisFlevy.com - Cost Drivers Analysis
Flevy.com - Cost Drivers Analysis
 
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
Extent 2013 Obninsk How a Great QA Team Can Make a Disproportionate Contribut...
 
How a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project SuccessHow a Great QA Team can make a Disproportionate Contribution to Project Success
How a Great QA Team can make a Disproportionate Contribution to Project Success
 
Back Up QA - Session 3
Back Up QA - Session 3Back Up QA - Session 3
Back Up QA - Session 3
 
Acedp november 2010 beijing workshop bond
Acedp november 2010 beijing workshop bondAcedp november 2010 beijing workshop bond
Acedp november 2010 beijing workshop bond
 
Measurement and scales
Measurement and scalesMeasurement and scales
Measurement and scales
 
Service recovery
Service recoveryService recovery
Service recovery
 
Delivering service quality and satisfying library customers in a changing env...
Delivering service quality and satisfying library customers in a changing env...Delivering service quality and satisfying library customers in a changing env...
Delivering service quality and satisfying library customers in a changing env...
 

Plus de Porfirio Tramontana

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfPorfirio Tramontana
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Porfirio Tramontana
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationPorfirio Tramontana
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsPorfirio Tramontana
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Porfirio Tramontana
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Porfirio Tramontana
 
Web Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEWeb Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEPorfirio Tramontana
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Porfirio Tramontana
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Porfirio Tramontana
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web ApplicationsPorfirio Tramontana
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Porfirio Tramontana
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindPorfirio Tramontana
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingPorfirio Tramontana
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolPorfirio Tramontana
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingPorfirio Tramontana
 
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Porfirio Tramontana
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Porfirio Tramontana
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsPorfirio Tramontana
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsPorfirio Tramontana
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionPorfirio Tramontana
 

Plus de Porfirio Tramontana (20)

An Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdfAn Approach for Model Based Testing of Augmented Reality Applications.pdf
An Approach for Model Based Testing of Augmented Reality Applications.pdf
 
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
Towards the Generation of Robust E2E Test Cases in Template-based Web Applica...
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing Automation
 
A technique for parallel gui testing of android applications
A technique for parallel gui testing of android applicationsA technique for parallel gui testing of android applications
A technique for parallel gui testing of android applications
 
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
Reverse Engineering of Data Models from Legacy Spreadsheets-Based Systems: An...
 
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
Reverse Engineering Techniques: from Web Applications to Rich Internet Applic...
 
Web Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSEWeb Application Testing in Fifteen Years of WSE
Web Application Testing in Fifteen Years of WSE
 
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
Towards a Better Comprehensibility of Web Applications: Lessons Learned from ...
 
Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach Comprehending Web Applications by a Clustering Based Approach
Comprehending Web Applications by a Clustering Based Approach
 
Reverse Engineering Web Applications
Reverse Engineering Web ApplicationsReverse Engineering Web Applications
Reverse Engineering Web Applications
 
Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications Recovering Interaction Design Patterns in Web Applications
Recovering Interaction Design Patterns in Web Applications
 
Improving Usability of Web Pages for Blind
Improving Usability of Web Pages for BlindImproving Usability of Web Pages for Blind
Improving Usability of Web Pages for Blind
 
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications TestingTechniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing
 
Comprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA ToolComprehending Ajax Web Applications by the DynaRIA Tool
Comprehending Ajax Web Applications by the DynaRIA Tool
 
A GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application TestingA GUI Crawling-based Technique for Android Mobile Application Testing
A GUI Crawling-based Technique for Android Mobile Application Testing
 
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
Using Dynamic Analysis for Generating End User Documentation for Web 2.0 Appl...
 
Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications Considering Context Events in Event-Based Testing of Mobile Applications
Considering Context Events in Event-Based Testing of Mobile Applications
 
Using GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android AppsUsing GUI Ripping for Automated Testing of Android Apps
Using GUI Ripping for Automated Testing of Android Apps
 
A Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android ApplicationsA Toolset for GUI Testing of Android Applications
A Toolset for GUI Testing of Android Applications
 
DynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application ComprehensionDynaRIA: a Tool for Ajax Web Application Comprehension
DynaRIA: a Tool for Ajax Web Application Comprehension
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

A policy-based evaluation framework for Quality and Security in Service Oriented Architectures

  • 1. A policy-based evaluation framework for Quality and Security in Service Oriented Architectures V. Casola A.R. Fasolino N. Mazzocca P. Tramontana Dipartimento di Informatica e Sistemistica Universita' degli Studi di Napoli, Federico II Naples, Italy {casolav, fasolino, n.mazzocca, ptramont}@unina.it 1
  • 2. Current Web Service Scenarios: • Customers ask for Web Services providing with specified Quality levels; • Providers are interested to publish both functional and quality characteristics of the Web Services they provide; • Service Level Agreements (SLAs) are contracts between a Customer and a Provider; they specify the characteristics in terms of performance and security of the provided services; they are usually expressed by means of free text documents, i.e. in natural language; •All these factors represent a wide limit in the formal definition and automatic evaluation of SLA.  Models are needed to formally express the Quality of Web Services (software quality, QoS, security and so on) requested by Customers and offered by 2 Providers
  • 3. Our Proposal: define a Quality Meta- Model Quality Model • Quality Characteristic: any quality requirements, such as Performance, Security, Cost, 1..n Maintainability Characteristic +SubCharacteristic 0..n •Characteristics may be arranged in a hierarchy 0..1 (Measurable Characteristics are the leaves) Measurable Characteristic • Measurable Characteristic: a Quality 1..n Characteristic that can directly be measured Component 1..n Quality Characteristic: Efficiency 1 oQuality Characteristic: Time Behaviour Measurement Unit Quality Characteristic: Response Time •Measurable Quality Characteristic: Average Response Time oComponent: Average Response Time Value  Measurement Unit: Seconds oComponent: Samples Number  Measurement Unit: Natural Number 3
  • 4. Open problem: How a Customer can choose the Web Service that better fits his quality requirements? Service Provider1 Quality Service Offer 1 Customer ? … Quality Service Request Provider n Quality Offer n •We propose to formally express Quality as an istance of the meta-model; •We adopt a decision framework for Quality evaluation; •The framework is based on AHP (Analytic Hierarchy Process) proposed by Saaty. T.L. Saaty. How to make a decision: the analytic 4 hierarchy process, European Journal of Operational Research, 1990. Vol. 48, n.1, Elsevier, pp. 9-26.
  • 5. The Analytical Hierarchy Process 1. The decision framework design activity: 1. Weight Assignment step: the relative importance of the characteristics is rated; 2. Clustering step: for each measurable characteristic, the sets of values that will be considered equivalent for the aims of the evaluation are defined; 3. Rating Step: each set is associated to a rating value; 1. The decision making activity: to compare the quality of an offered service (formalised in a Quality Offer Model) against requestor needs (formalised in a Quality Request Model) 5
  • 6. Step 1: Weight Assignment Intensity of Importance and its Average Standard Maximum interpretation Response Deviation of Response Intensity of Interpretation Time Response Time Time Importance Average 1 3 7 1 Equal Importance Response Time 1. Build the 3 Moderate Standard 1/3 1 5 Comparison Importance Deviation matrix Response Time 5 Strong Importance Maximum 1/7 1/5 1 7 Very strong Response Time Importance 2. Normalize 9 Extreme Importance The matrix Average Standard Maximum Weights Response Deviation Response Time Response Time Characteristic Weights Time are assigned by Average Response 21/31 15/21 7/13 0.64 comparing their relative Time importance: Standard 7/31 5/21 5/13 0.28 n Deviation m' (i, k ) w(i ) = ∑ Response Time ∀i k =1 n Maximum 3/31 1/21 1/13 0.07 Response Time 6
  • 7. Step 2: Clustering Let’s consider the Average Response Time characteristic R = Offered_value / Requested_value R < 0.5 (very fast response); Possible Solutions are 0.5≤ R <1 (sufficiently fast clustered in three levels: response); 1≤ R <2 (quite slow response). Step 3: Rating Intensity of Goodness and its Ratings are assigned to clusters by interpretation comparing their relative Goodness Intensity of Interpretation Goodness R<0.5 0.5≤R<1 1≤R<2 Rating 1 Equivalent R < 0.5 1 3 5 0.63 3 Moderately 0.5≤R<1 1/3 1 3 0.26 better 1≤ R<2 1/5 1/3 1 0.11 5 Strongly better 7 Very strongly better 0.63 if R < 0.5 Satisfaction  9 Extremely better S (R ) = 0.26 if 0.5 ≤ R < 1 Function S(R)  0.11 if7 1 ≤ R < 2 
  • 8. The Decision Making Activity The Quality of different Web Services is compared by evaluating: 1. a Satisfaction Function for each Measurable Characteristic. 2. a Satisfaction Function for each non-Measurable Characteristic S c (request , offer ) = ∑w sc∈C ( c ) sc S sc (request , offer ) 3. the Overall Satisfaction Function: S (request , offer ) = ∑ w S (request, offer ) c c c∈Characteristic The Web Service with the greater Satisfaction Function value is chosen 8