Cloud-Enabled Software Testing Based on Program Understanding

Cloud computing provides an innovative technology that enables Software as a Service (SaaS) to its customers. With cloud computing technologies, a suite of program understanding tools is suggested to be deployed in a cloud to aid the generation of test cases for software testing. This cloud-enabled service allows customers to use these tools through an on-demand, flexible, and pay-per-use model. Lastly, the issues and challenges of cloud computing are presented. DOI: 10.4018/978-1-4666-2536-5.ch003

[1]  Betty H. C. Cheng,et al.  A framework for classifying and comparing software reverse engineering and design recovery techniques , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).

[2]  Harald C. Gall,et al.  A comparison of four reverse engineering tools , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.

[3]  R. E. Kurt Stirewalt,et al.  The interleaving problem in program understanding , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.

[4]  N. Raghavendra Rao Enterprise Management Strategies in the Era of Cloud Computing , 2015 .

[5]  Arie van Deursen,et al.  A Controlled Experiment for Program Comprehension through Trace Visualization , 2011, IEEE Transactions on Software Engineering.

[6]  Roma Chauhan,et al.  A Case Study of the Health Cloud , 2014 .

[7]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[8]  Leandro Soares Indrusiak,et al.  Handbook of Research on Embedded Systems Design , 2014 .

[9]  Keith H. Bennett,et al.  Legacy Systems: Coping with Success , 1995, IEEE Softw..

[10]  Sushil K. Prasad,et al.  A Mobile Fleet Application Case Study Using SyD Middleware , 2012 .

[11]  Marijana Despotović-Zrakić,et al.  Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education , 2014 .

[12]  Shamsul Sahibuddin,et al.  Software Process Improvement and Management: Approaches and Tools for Practical Development , 2011 .

[13]  Nicholas Zvegintzov A Resource Guide to Year 2000 Tools , 1997, Computer.

[14]  Anastasia N. Kastania,et al.  Cloud Computing Applications for Quality Health Care Delivery , 2014 .

[15]  P. Venkata Krishna,et al.  Challenges, Opportunities, and Dimensions of Cyber-Physical Systems , 2014 .

[16]  Qiang Yang,et al.  The program understanding problem: analysis and a heuristic approach , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.

[17]  Nicolas Guelfi,et al.  SETER: Towards Architecture-Model Based Security Engineering , 2012, Int. J. Secur. Softw. Eng..

[18]  Veljko Milutinovic,et al.  Exploiting Spatial and Temporal Patterns in a High-Performance CPU , 2014 .

[19]  Betty H. C. Cheng,et al.  Strongest postcondition semantics as the formal basis for reverse engineering , 2004, Automated Software Engineering.

[20]  Michael Losavio,et al.  Regulatory Aspects of Cloud Computing in Business Environments , 2015 .

[21]  KolagariRamin Tavakoli,et al.  Model-Based Analysis and Engineering of Automotive Architectures with EAST-ADL , 2015 .

[22]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[23]  M. Scott Tort Liability for Vendors of Insecure Software: Has the Time Finally Come? , 2007 .

[24]  Paul Hofmann,et al.  Cloud Computing: The Limits of Public Clouds for Business Applications , 2010, IEEE Internet Computing.

[25]  Paulo S. C. Alencar,et al.  Handbook of Research on Mobile Software Engineering: Design, Implementation, and Emergent Applications , 2012 .

[26]  Arie van Deursen,et al.  Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.

[27]  Zhaohao Sun,et al.  Secure Network Solutions for Enterprise Cloud Services , 2014 .

[28]  Stéphane Ducasse,et al.  Polymetric Views - A Lightweight Visual Approach to Reverse Engineering , 2003, IEEE Trans. Software Eng..

[29]  M. Brian Blake,et al.  Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.

[30]  Minnie Yi-Miin Yen,et al.  Cloud Computing Security and Risk Management , 2013 .

[31]  Joel J. P. C. Rodrigues,et al.  Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , 2013 .

[32]  Sergey Bratus,et al.  Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain , 2010, Int. J. Secur. Softw. Eng..

[33]  George Candea,et al.  Automated software testing as a service , 2010, SoCC '10.

[34]  Salwa K. Abd-El-Hafiz,et al.  A Knowledge-Based Approach to the Analysis of Loops , 1996, IEEE Trans. Software Eng..

[35]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[36]  S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments , 2014 .

[37]  Stephen H. Edwards,et al.  A framework for practical, automated black‐box testing of component‐based software † , 2001, Softw. Test. Verification Reliab..

[38]  David B. Paradice,et al.  On the Study of Complexity in Information Systems , 2008, Int. J. Inf. Technol. Syst. Approach.

[39]  David B. Paradice Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications , 2009 .