2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting...
Transcript of 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting...
2012 IEEE 36th Annual
Computer Software and
Applications Conference
Workshops
(COMPSACW 2012)
Izmir, Turkey16 - 20 July 2012
IEEE IEEE Catalog Number: CFP1267K-PRT
ISBN: 978-1-4673-2714-5
2012 IEEE 36th International
Conference on Computer Software
and Applications Workshops
COMPSACW 2012
Table of Contents
Message from the Workshops Chairs xvi
SSS 2012: The Fifth IEEE International Workshop
on Service Science and Systems xvii
MidArch 2012: The Sixth Middleware Architecture
in the Internet xix
METHOD 2012: The First IEEE International
Workshop on Methods for Establishing Trust
with Open Data xxi
IWSC 2012: The Ninth IEEE International Workshop
on Software Cybernetics xxiii
CFSE 2012: The Fourth IEEE International Workshop
on Computer Forensics in Software Engineering xxv
MVDA 2012: The First IEEE International Workshop
on Modeling and Verifying Distributed Applications xxvii
QUORS 2012: The Sixth IEEE International Workshop
on Quality Oriented Reuse of Software xxix
REFS 2012: The Sixth IEEE International Workshop
on Requirements Engineering for Services xxxi
SAPSE 2012: The Fourth IEEE International
Workshop on Security Aspects in Processes
and Services Engineering xxxiii
STA 2012: The Fourth IEEE International Workshop
on Software Test Automation xxxv
V
IEESD 2012: The Fourth IEEE International Workshop
on Industrial Experience in Embedded Systems
Design xxxvii
TiP 2012: The First IEEE International Workshop
on Tools in Embedded Systems Design Process xxxix
CORCS 2012: The Fourth IEEE International
Workshop on Component-Based Design
of Resource-Constrained Systems xli
STPSA 2012: The Seventh IEEE International
Workshop on Security, Trust, and Privacy
for Software Applications xliii
ESAS 2012: The Seventh IEEE International
Workshop on Engineering Semantic Agent Systems xlv
Invited Talk
Asian Information HUB Project: NICT's R&D Vsion and Strategies
for Universal Communication Technology in the Big Data Era 1
Michiaki Iwazume, Hideaki Fujii, Takahiro Iwase, Hiroshi Haraguchi,
and Makoto Hijiya
SSS Session 1: Service Creation and Evolution
Automated Web Service Composition Using Genetic Programming 7
Liyuan Xiao, Carl K. Chang, Hen-I Yang, Kai-Shin Lu, and Hsln-yi Jiang
User's Requirements Driven Services Adaptation and Evolution 13
Ziyan Xu, Haihong Zhao, and Lin Liu
An Adaptive Quality Level Selection Method for Efficient QoS-Aware Service
Composition 20
Jae-Hyun Cho, Jang-Ho Choi, Han-Gyu Ko, and In-Young Ko
A Novel Solution of Distributed File Storage for Cloud Service 26
Yu Zhang, Weidong Liu, and Jiaxing Song
vi
SSS Session 2: Service Marketing and Management
GARSS: A Generic Annotation and Recommendation Service System
for Digital Repositories 32
Xiaodong Huang, Yong Zhang, and Chunxiao Xing
Material Hub: A Semantic Search Engine with Rule Reasoning 38
Sen Ma, Wen Zhao, Shi-kun Zhang, and Hang Zhang
Integrated QoS Utility-Based Model for Cloud Computing Service Provider
Selection 45
Maria Salama, Ahmed Shawish, AmirZeid, and Mohamed Kouta
SSS Session 3: Service Paradigms in IndustryService Level Management for Service Value Networks 51
Frank Schulz, Wibke Michalk, Markus Hedwig, Marcus McCaliister,
Christof Momm, Simon Caton, Christian Haas, Daniel Rolli, and Monika Tavas
Agent-Based Simulation and Its Applications to Service Management: Invited
Talk 57
Yang Li
MidArch 1
Application Architecture to Foster User-Centric Information Discovery
and Retrieval 58
Toru Kobayashi
Secure ID Transformation for Robust Pseudonymity against Backflow
of Personal Information in SAML Federation 64
Wataru Oogami, Takaaki Komura, and Yasuo Okabe
Secure Monitoring for Identity Federations and Distributed Systems 70
Miguel Macias Enguldanos and Jaime Perez Crespo
MidArch 2
Flexible Access Control Framework Considering IdP-Side's Authorization
Policy in Roaming Environment 76
Toshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto,
and Hideaki Sone
Implementation and Evaluation of an OpenFlow-Based Access Control
System for Wireless LAN Roaming 82
Shunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto,
and Hideaki Sone
vii
A Prototype of Network Failure Avoidance Functionality for SAGE Using
OpenFlow 88
Tomoya Furuichi, Susumu Date, Hiroaki Yamanaka, Kohei Ichikawa,
Hirotake Abe, Haruo Takemura, and Eiji Kawai
MidArch 3
Group Management System for Federated Identities with Flow Control
of Membership Information by Subjects 94
Takeshi Nishimura, Motonori Nakamura, Makoto Otani, Kazutsuna Yamaji,
and Noboru Sonehara
Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level
of Assurance 100
Shigeaki Tanimoto, Shinichi Mizuhara, Msasahiko Yokoi, Hiroyuki Sato,
and Atsushi Kanai
METHOD Session 1
Linked Open Data Aggregation: Conflict Resolution and Aggregate Quality 106
Tomas Knap, Jan Michelfeit, and Martin Necasky
Identification and Utilization of Components for a Linked Open Data Platform 112
Evanela Lapi, Nikolay Tcholtchev, Louay Bassbouss, Florian Marienfeld,
and Ina Schieferdecker
Sensor Information Fueling Open Data 116
Miquel Oliver, Manuel Palacin, Albert Domingo, and Victor Vails
METHOD Session 2
Automated Trust Estimation in Developing Open News Stories: Combining
Memento & Provenance 122
Erik Mannens, Sam Coppens, Ruben Verborgh, Laurence Hauttekeete,
Davy Van Deursen, and Rik Van de Walle
Privacy Preserving Data Publishing for Recommender System 128
Xiaoqiang Chen and Vincent Huang
METHOD Session 3
Attack Vectors to Metering Data in Smart Grids under Security Constraints 134
Florian Skopik and Zhendong Ma
Protecting Resources in an Open and Trusted Peer-to-Peer Network 140
J.-F. Lalande and D. Rodriguez
viii
IWSC 2012 Session 1
Architectural Concepts: Evolution of a Software System across Design
and Implementation Stages in Dynamically Changing Environments 144
Bahtijar Vogel, Arianit Kurti, Marcelo Milrad, and Tommi Mikkonen
A Graph Transformation Based Approach for Modeling Component-Level
Migration in Mobile Environments 152
Yu Zhou, Xuefeng Yan, and Zhiqiu Huang
Towards a General Supporting Framework for Self-Adaptive Software
Systems 158
Liangdong Wang, Yang Gao, Chun Cao, and Li Wang
Learning-Based Multi-controller Coordination for Self-Optimization 164
Richang Lin, Bihuan Chen, YiXie, Xin Peng, and Wenyun Zhao
IWSC 2012 Session 2
Distribution-Aware Mutation Analysis 170
Chang-ai Sun, Guan Wang, Kai-Yuan Cai, and Tsong Yueh Chen
A Reputation System for Trustworthy QoS Information in Service-Based
Systems 176
Jun Lin, Changhai Jiang, Hai Hu, Kai-Yuan Cai, Stephen S. Yau, and Dazhi Huang
Program Behavior Analysis and Control for Online IDE 182
Ling Wu, Guangtai Liang, and Qianxiang Wang
IWSC 2012 Session 3
Safe Regression Test Selection Based on Program Dependence Graphs 188
Jianchun Xing, Hongda Wang, Wei Song, and Qiliang Yang
CFSE-1
Cloud Log Forensics Metadata Analysis 194
Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir
Proposal and Evaluation of the Digital Certificate System with Sumi-coating
Module for Privacy Protection 200
Takashi Sakuma and Ryoichi Sasaki
ix
CFSE-2
Software Piracy Forensics: A Proposal for Incorporating Dead Codes
and Other Programming Blunders as Important Evidence in AFC Test 206
P. Vinod Bhattathiripad
Development of InfoVis Software for Digital Forensics 213
Grant Osborne, Benjamin Turnbull, and Jill Slay
MVDA-1: Algorithms and Platforms
A Graphical Language to Integrate Process Algebra and State Machine Views
for Specification and Verification of Distributed Real-Time Systems 218
Jinho On, Sujeong Woo, and Moonkun Lee
A BPEL4WS Extension to Develop and Execute Grid Service Workflow
Application 224
Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fraj,
and Ahlem Benyounes
A Distributed and Coordinated Massive DDOS Attack Detection and Response
Approach 230
Mohamed Karim Aroua and Belhassen Zouari
MVDA-2: Emerging Techniques
UML AD Refinement Patterns for Modeling Workflow Applications 236
Ahlem Ben Younes, Leila Jemni Ben Ayed, and Yousra Bendaly Hlaoui
An Efficient IPTV Distribution Technique under NAT Environment 242
Ming-Huang Chen, Yaw-Chung Chen, and Wen-Kang Jia
MVDA-3: Formal Approaches
Automatic Generation of an Operational CSP-Z Specification from an Abstract
Temporal"Z Specification 248
Thouraya Gouasmi, Amira Regayeg, and Ahmed Had] Kacem
A Semantics-Based Privacy-Aware Approach for Fragmenting Business
Processes 254
Mohamed-Anis Zemni, Nejib Ben Hadj-Anouane, and Moez Yeddes
QUORS 1: Software Evolution
Evaluating the Extended Refactoring Guidelines 260
Wafa Basit, Fakhar Lodhi, and Muhammad Usman Bhatti
Quantifying Quality of Software Design to Measure the Impact of Refactoring 266
Tushar Sharma
X
Mining Association Rules to Facilitate Structural Recovery 272
WuRen
QUORS 2: Reuse-Driven Design and Patterns
Towards Reuse-Based Development for the On-chip Distributed SoC
Architecture 278
Moazzam Fareed Niazi, Tiberiu Seceleanu, and Hannu Tenhunen
Performance Comparison of Combined Collaborative Filtering Algorithms
for Recommender Systems 284
Dilek Tapucu, Seda Kasap, and Fatih Tekbacak
Simplifying the Design of Signature Workflow with Patterns 290
Hwai-Jung Hsu, Ming-Wei Tsai, and Feng-Jian Wang
A New Cohesion Metric and Restructuring Technique for Object Oriented
Paradigm 296
Mehmet Kaya and James W. Fawcett
QUORS 3: Advanced Component-Based Software EngineeringPerformance Analysis of Reusable Components with Hybrid Modelling
of Strategies and Processes: A Real World Case Study 302
Sheau Ling Tan and Lin Liu
Translation Rules and a Supporting Tool for Model-Based Reuse 310
Junfeng Zhao, Jiantao Zhou, and Jing Liu
Parallel Software Reuse Driven CPN Model Reduction and Analysis Approach 316
Tao Sun, Xinming Ye, Hongji Yang, and Jing Liu
QUORS 4: Cloud Computing Services and QoS
A QoS Assurance Middleware Model for Enterprise Cloud Computing 322
Shou-Yu Lee, Dongyang Tang, Tingchao Chen, and William Cheng-Chung Chu
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology 328
Daren Fang, Xiaodong Liu, Imed Romdhani, and Huiqun Zhao
SE-EQUAM - An Evolvable Quality Metamodel 334
Aseel Hmood, Iman Keivanloo, and Juergen Riiling
REFS 1: Keynote Speech I
Introduction to Our Honored Keynote Speakers 340
Willem-Jan van den Heuvel
xi
REFS 2: RE for Services Adaptation and Evolution
Viewpoints and Issues in Requirements Engineering for Services 341
Jolita Ralyie
A Goal-Oriented Perspective on Approaches to Web Service Discovery 347
Said Assar, Carine Souveyet, and Kadan Aljoumaa
Software Service Evolution: A Requirements Perspective 353
Feng-Lin Li, Lin Liu, and John Mylopoulos
Representing Non-functional Requirements on Services - A Case Study 359
Clotilde Rohleder
REFS 3: RE for Non-functional RequirementsMutual Refinement of Security Requirements and Architecture Using Twin
Peaks Model 367
Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka
Automated Reasoning with Goal Tree Models for Software Quality
Requirements 373
Bo Wei, Zhi Jin, Didar Zowghi, and Bin Yin
Improving Software Quality Requirements Specifications Using Spectrum
Analysis 379
Haruhiko Kaiya and Atsushi Ohnishi
The Concepts and Ontology of SiSL: A Situation-Centric Specification
Language 385
Haihua Xie, Carl K. Chang, Hua Ming, and Kai-Shin Lu
A Functional Implementation Approach for Web Services-Based
Context-Aware Systems 392
Jianchu Huang and Hongji Yang
REFS 4: REFS Panel
Requirements Engineering for Service Adaptation and Evolution 398
Lin Liu
SAPSE 1
Modeling of A-Posteriori Access Control in Business Processes 403
Mohamed Karim Aroua and Belhassen Zouari
Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMN 409
Hejiao Huang and Qiang Zhou
Database as a Service: Towards a Unified Solution for Security Requirements 415
M. A. Hadavi, M. Noferesti, R. Jalili, and E. Damiani
xii
SAPSE 2
Deriving Process-Related RBAC Models from Process Execution Histories 421
Anne Baumgrass, Sigrid Schefer-Wenzl, and Mark Strembeck
Approximation Algorithms for Minimizing the Number of Roles
and Administrative Assignments in RBAC 427
Hejiao Huang, Feng Shang, and Jiangtao Zhang
Robust XML Watermarking Using Fuzzy Queries 433
Tchokpon Romaric, Ernesto Damiani, and Nadia Bennani
STA2 Agile Software TestingModel Based Test Automation through Asynchronous Channels 439
Robert M. Hierons
Strategies for Agile Software Testing Automation: An Industrial Experience 440
Eliane Collins, Arilo Dias-Neto, and Vicente F. de Lucena Jr.
Adaptive Agile Performance Modeling and Testing 446
Marek G. Stochel, Mariusz R. Wawrowski, and James J. Waskiel
STA3 Testing Mobile and Open Software
Model-Based Conformance Testing of WS-BPEL Compositions 452
AfefJmal Maalej, Moez Krichen, and Mohamed Jma'fel
A Conceptual Framework for Open Source Software Test Process 458
Tamer Abdou, Peter Grogono, and Pankaj Kamthan
STA4 Testing Large Systems
Mining Data Chain Graph for Fault Localization 464
Bo Yang, Ji Wu, and Chao Liu
Effects of Class Imbalance in Test Suites: An Empirical Study
of Spectrum-Based Fault Localization 470
Cheng Gong, Zheng Zheng, Wei Li, and Peng Hao
lEESD-TiP 1
Load Balancing for Cross Layer Communication 476
John F. Schommer, Dominik Franke, Tim Lange, and Stefan Kowalewski
Development of a Mobile Platform to Support Building Maintenance
Engineering 482
Paul Stack
An Estimation Model for the Savings Achievable by Tool Chains 488
Matthias Biehl and Martin Tdrngren
xiii
lEESD-TiP 2
GcLite: An Expert Tool for Analyzing Garbage Collection Behavior 493
Vasileios Angelopoulos, Trevor Parsons, John Murphy, and Pattrick O'Sullivan
Integration and Analysis of Design Artefacts in Embedded Software
Development 503
Daniel Merschen, Julian Pott, and Stefan Kowalewski
Product Line Variability Modeling Based on Model Difference and Merge 509
Kunming Nie, Li Zhang, and Zengtao Geng
CORCS 1
Performance Awareness in Component Systems: Vision Paper 514
Lubomir Bulej, Tomas Bures, Vojtech Horky, Jaroslav Keznikl, and Petr Tuma
Understanding the Role of Transmission Power in Component-Based
Architectures for Adaptive WSN 520
Guillermo Rodriguez-Navas, Miquel A. Ribot, and Bartomeu Alorda
Tool-Supported Methodology for Component-Based Design of Wireless
Sensor Network Applications 526
Steffen Peter and Peter Langenddrfer
CORCS 2
Extending EAST-ADL for Modeling and Analysis of System's Resource-Usage 532
Raluca Marinescu and Eduard Paul Enoiu
Modelling the Design for an SOA System to Control a Small Scale Energy
Zone 538
Maria Anjum and David Budgen
Rule Based Axiomatic Design Theory Guidance for Software Development 544
Cengiz Togay, Emre Selman Caniaz, and AH Hikmet Dogru
STPSA 1
Branch Obfuscation Using Code Mobility and Signal 553
Zhi Wang, Chunfu Jia, Min Liu, and Xiaoxu Yu
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based
Limited Symbolic Evaluation 559
Sun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan,
and Hongyu Zhang
Towards a Secure Software Development Lifecycle with SQUARE+R 565
Welder D. Yu and Kyle Le
xiv
STPSA 2
Internet-Based Evaluation and Prediction of Web Services Trustworthiness 571
Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, and Bing Xie
On Security Analysis of PHP Web Applications 577
David Hauzar and Jan Kofron
Measuring the Software Security Requirements Engineering Process 583
Nancy R. Mead
STPSA 3
Attack Model Based Penetration Test for SQL Injection Vulnerability 589
Wei Tian, Ju-Feng Yang, Jing Xu, and Guan-Nan Si
An Efficient Graph Codec System for Software Watermarking 595
Maria Chroni and Stavros D. Nikolopoulos
ESAS 1
Conditional Ontology Mapping 601
Islam Elgedawy
Integration of 3D Trajectory Maps into a Local Distribution Map of Radiation
Dose Using Unmanned Aerial Vehicle 607
Katsunori Oyama, Hiroyuki Wakabayashi, Atsushi Takeuchi, and Naoki Ishitsuka
A Load Balancing Scheme for Distributed Simulation Based on Multi-agent
System 613
Young Joon Lee, Geon Yong Park, Ho Kuen Song, and Hee Yong Youn
The Semantics of the Interaction between Agents and Web Services on
the Semantic Web 619
Sinem Getir, Moharram Challenger, Sebla Demirkol, and Geylani Kardas
ESAS 2
Integrating Linked Data Space with Agents Using the Environment Abstraction 625
Riza Cenk Erdur, Oguz Dikenelli, Oylum Alatli, Erdem Eser Ekinci, and Ziya Akar
An Image Processing Approach to Solve Labyrinth Discovery Robotics
Problem 631
Behnam Rahnama, Atilla Elgi, and Shadi Metani
Development of Semantic Model and Information Exploration System for TV
Media 637
Duygu Qelik, Atilla Elgi, Esra Calik, and Ayman Ahmad Khalil
Author Index .643