12
2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW 2012) Izmir, Turkey 16 - 20 July 2012 IEEE IEEE Catalog Number: CFP1267K-PRT ISBN: 978-1-4673-2714-5

2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

2012 IEEE 36th Annual

Computer Software and

Applications Conference

Workshops

(COMPSACW 2012)

Izmir, Turkey16 - 20 July 2012

IEEE IEEE Catalog Number: CFP1267K-PRT

ISBN: 978-1-4673-2714-5

Page 2: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

2012 IEEE 36th International

Conference on Computer Software

and Applications Workshops

COMPSACW 2012

Table of Contents

Message from the Workshops Chairs xvi

SSS 2012: The Fifth IEEE International Workshop

on Service Science and Systems xvii

MidArch 2012: The Sixth Middleware Architecture

in the Internet xix

METHOD 2012: The First IEEE International

Workshop on Methods for Establishing Trust

with Open Data xxi

IWSC 2012: The Ninth IEEE International Workshop

on Software Cybernetics xxiii

CFSE 2012: The Fourth IEEE International Workshop

on Computer Forensics in Software Engineering xxv

MVDA 2012: The First IEEE International Workshop

on Modeling and Verifying Distributed Applications xxvii

QUORS 2012: The Sixth IEEE International Workshop

on Quality Oriented Reuse of Software xxix

REFS 2012: The Sixth IEEE International Workshop

on Requirements Engineering for Services xxxi

SAPSE 2012: The Fourth IEEE International

Workshop on Security Aspects in Processes

and Services Engineering xxxiii

STA 2012: The Fourth IEEE International Workshop

on Software Test Automation xxxv

V

Page 3: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

IEESD 2012: The Fourth IEEE International Workshop

on Industrial Experience in Embedded Systems

Design xxxvii

TiP 2012: The First IEEE International Workshop

on Tools in Embedded Systems Design Process xxxix

CORCS 2012: The Fourth IEEE International

Workshop on Component-Based Design

of Resource-Constrained Systems xli

STPSA 2012: The Seventh IEEE International

Workshop on Security, Trust, and Privacy

for Software Applications xliii

ESAS 2012: The Seventh IEEE International

Workshop on Engineering Semantic Agent Systems xlv

Invited Talk

Asian Information HUB Project: NICT's R&D Vsion and Strategies

for Universal Communication Technology in the Big Data Era 1

Michiaki Iwazume, Hideaki Fujii, Takahiro Iwase, Hiroshi Haraguchi,

and Makoto Hijiya

SSS Session 1: Service Creation and Evolution

Automated Web Service Composition Using Genetic Programming 7

Liyuan Xiao, Carl K. Chang, Hen-I Yang, Kai-Shin Lu, and Hsln-yi Jiang

User's Requirements Driven Services Adaptation and Evolution 13

Ziyan Xu, Haihong Zhao, and Lin Liu

An Adaptive Quality Level Selection Method for Efficient QoS-Aware Service

Composition 20

Jae-Hyun Cho, Jang-Ho Choi, Han-Gyu Ko, and In-Young Ko

A Novel Solution of Distributed File Storage for Cloud Service 26

Yu Zhang, Weidong Liu, and Jiaxing Song

vi

Page 4: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

SSS Session 2: Service Marketing and Management

GARSS: A Generic Annotation and Recommendation Service System

for Digital Repositories 32

Xiaodong Huang, Yong Zhang, and Chunxiao Xing

Material Hub: A Semantic Search Engine with Rule Reasoning 38

Sen Ma, Wen Zhao, Shi-kun Zhang, and Hang Zhang

Integrated QoS Utility-Based Model for Cloud Computing Service Provider

Selection 45

Maria Salama, Ahmed Shawish, AmirZeid, and Mohamed Kouta

SSS Session 3: Service Paradigms in IndustryService Level Management for Service Value Networks 51

Frank Schulz, Wibke Michalk, Markus Hedwig, Marcus McCaliister,

Christof Momm, Simon Caton, Christian Haas, Daniel Rolli, and Monika Tavas

Agent-Based Simulation and Its Applications to Service Management: Invited

Talk 57

Yang Li

MidArch 1

Application Architecture to Foster User-Centric Information Discovery

and Retrieval 58

Toru Kobayashi

Secure ID Transformation for Robust Pseudonymity against Backflow

of Personal Information in SAML Federation 64

Wataru Oogami, Takaaki Komura, and Yasuo Okabe

Secure Monitoring for Identity Federations and Distributed Systems 70

Miguel Macias Enguldanos and Jaime Perez Crespo

MidArch 2

Flexible Access Control Framework Considering IdP-Side's Authorization

Policy in Roaming Environment 76

Toshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto,

and Hideaki Sone

Implementation and Evaluation of an OpenFlow-Based Access Control

System for Wireless LAN Roaming 82

Shunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto,

and Hideaki Sone

vii

Page 5: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

A Prototype of Network Failure Avoidance Functionality for SAGE Using

OpenFlow 88

Tomoya Furuichi, Susumu Date, Hiroaki Yamanaka, Kohei Ichikawa,

Hirotake Abe, Haruo Takemura, and Eiji Kawai

MidArch 3

Group Management System for Federated Identities with Flow Control

of Membership Information by Subjects 94

Takeshi Nishimura, Motonori Nakamura, Makoto Otani, Kazutsuna Yamaji,

and Noboru Sonehara

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level

of Assurance 100

Shigeaki Tanimoto, Shinichi Mizuhara, Msasahiko Yokoi, Hiroyuki Sato,

and Atsushi Kanai

METHOD Session 1

Linked Open Data Aggregation: Conflict Resolution and Aggregate Quality 106

Tomas Knap, Jan Michelfeit, and Martin Necasky

Identification and Utilization of Components for a Linked Open Data Platform 112

Evanela Lapi, Nikolay Tcholtchev, Louay Bassbouss, Florian Marienfeld,

and Ina Schieferdecker

Sensor Information Fueling Open Data 116

Miquel Oliver, Manuel Palacin, Albert Domingo, and Victor Vails

METHOD Session 2

Automated Trust Estimation in Developing Open News Stories: Combining

Memento & Provenance 122

Erik Mannens, Sam Coppens, Ruben Verborgh, Laurence Hauttekeete,

Davy Van Deursen, and Rik Van de Walle

Privacy Preserving Data Publishing for Recommender System 128

Xiaoqiang Chen and Vincent Huang

METHOD Session 3

Attack Vectors to Metering Data in Smart Grids under Security Constraints 134

Florian Skopik and Zhendong Ma

Protecting Resources in an Open and Trusted Peer-to-Peer Network 140

J.-F. Lalande and D. Rodriguez

viii

Page 6: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

IWSC 2012 Session 1

Architectural Concepts: Evolution of a Software System across Design

and Implementation Stages in Dynamically Changing Environments 144

Bahtijar Vogel, Arianit Kurti, Marcelo Milrad, and Tommi Mikkonen

A Graph Transformation Based Approach for Modeling Component-Level

Migration in Mobile Environments 152

Yu Zhou, Xuefeng Yan, and Zhiqiu Huang

Towards a General Supporting Framework for Self-Adaptive Software

Systems 158

Liangdong Wang, Yang Gao, Chun Cao, and Li Wang

Learning-Based Multi-controller Coordination for Self-Optimization 164

Richang Lin, Bihuan Chen, YiXie, Xin Peng, and Wenyun Zhao

IWSC 2012 Session 2

Distribution-Aware Mutation Analysis 170

Chang-ai Sun, Guan Wang, Kai-Yuan Cai, and Tsong Yueh Chen

A Reputation System for Trustworthy QoS Information in Service-Based

Systems 176

Jun Lin, Changhai Jiang, Hai Hu, Kai-Yuan Cai, Stephen S. Yau, and Dazhi Huang

Program Behavior Analysis and Control for Online IDE 182

Ling Wu, Guangtai Liang, and Qianxiang Wang

IWSC 2012 Session 3

Safe Regression Test Selection Based on Program Dependence Graphs 188

Jianchun Xing, Hongda Wang, Wei Song, and Qiliang Yang

CFSE-1

Cloud Log Forensics Metadata Analysis 194

Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir

Proposal and Evaluation of the Digital Certificate System with Sumi-coating

Module for Privacy Protection 200

Takashi Sakuma and Ryoichi Sasaki

ix

Page 7: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

CFSE-2

Software Piracy Forensics: A Proposal for Incorporating Dead Codes

and Other Programming Blunders as Important Evidence in AFC Test 206

P. Vinod Bhattathiripad

Development of InfoVis Software for Digital Forensics 213

Grant Osborne, Benjamin Turnbull, and Jill Slay

MVDA-1: Algorithms and Platforms

A Graphical Language to Integrate Process Algebra and State Machine Views

for Specification and Verification of Distributed Real-Time Systems 218

Jinho On, Sujeong Woo, and Moonkun Lee

A BPEL4WS Extension to Develop and Execute Grid Service Workflow

Application 224

Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fraj,

and Ahlem Benyounes

A Distributed and Coordinated Massive DDOS Attack Detection and Response

Approach 230

Mohamed Karim Aroua and Belhassen Zouari

MVDA-2: Emerging Techniques

UML AD Refinement Patterns for Modeling Workflow Applications 236

Ahlem Ben Younes, Leila Jemni Ben Ayed, and Yousra Bendaly Hlaoui

An Efficient IPTV Distribution Technique under NAT Environment 242

Ming-Huang Chen, Yaw-Chung Chen, and Wen-Kang Jia

MVDA-3: Formal Approaches

Automatic Generation of an Operational CSP-Z Specification from an Abstract

Temporal"Z Specification 248

Thouraya Gouasmi, Amira Regayeg, and Ahmed Had] Kacem

A Semantics-Based Privacy-Aware Approach for Fragmenting Business

Processes 254

Mohamed-Anis Zemni, Nejib Ben Hadj-Anouane, and Moez Yeddes

QUORS 1: Software Evolution

Evaluating the Extended Refactoring Guidelines 260

Wafa Basit, Fakhar Lodhi, and Muhammad Usman Bhatti

Quantifying Quality of Software Design to Measure the Impact of Refactoring 266

Tushar Sharma

X

Page 8: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

Mining Association Rules to Facilitate Structural Recovery 272

WuRen

QUORS 2: Reuse-Driven Design and Patterns

Towards Reuse-Based Development for the On-chip Distributed SoC

Architecture 278

Moazzam Fareed Niazi, Tiberiu Seceleanu, and Hannu Tenhunen

Performance Comparison of Combined Collaborative Filtering Algorithms

for Recommender Systems 284

Dilek Tapucu, Seda Kasap, and Fatih Tekbacak

Simplifying the Design of Signature Workflow with Patterns 290

Hwai-Jung Hsu, Ming-Wei Tsai, and Feng-Jian Wang

A New Cohesion Metric and Restructuring Technique for Object Oriented

Paradigm 296

Mehmet Kaya and James W. Fawcett

QUORS 3: Advanced Component-Based Software EngineeringPerformance Analysis of Reusable Components with Hybrid Modelling

of Strategies and Processes: A Real World Case Study 302

Sheau Ling Tan and Lin Liu

Translation Rules and a Supporting Tool for Model-Based Reuse 310

Junfeng Zhao, Jiantao Zhou, and Jing Liu

Parallel Software Reuse Driven CPN Model Reduction and Analysis Approach 316

Tao Sun, Xinming Ye, Hongji Yang, and Jing Liu

QUORS 4: Cloud Computing Services and QoS

A QoS Assurance Middleware Model for Enterprise Cloud Computing 322

Shou-Yu Lee, Dongyang Tang, Tingchao Chen, and William Cheng-Chung Chu

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology 328

Daren Fang, Xiaodong Liu, Imed Romdhani, and Huiqun Zhao

SE-EQUAM - An Evolvable Quality Metamodel 334

Aseel Hmood, Iman Keivanloo, and Juergen Riiling

REFS 1: Keynote Speech I

Introduction to Our Honored Keynote Speakers 340

Willem-Jan van den Heuvel

xi

Page 9: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

REFS 2: RE for Services Adaptation and Evolution

Viewpoints and Issues in Requirements Engineering for Services 341

Jolita Ralyie

A Goal-Oriented Perspective on Approaches to Web Service Discovery 347

Said Assar, Carine Souveyet, and Kadan Aljoumaa

Software Service Evolution: A Requirements Perspective 353

Feng-Lin Li, Lin Liu, and John Mylopoulos

Representing Non-functional Requirements on Services - A Case Study 359

Clotilde Rohleder

REFS 3: RE for Non-functional RequirementsMutual Refinement of Security Requirements and Architecture Using Twin

Peaks Model 367

Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka

Automated Reasoning with Goal Tree Models for Software Quality

Requirements 373

Bo Wei, Zhi Jin, Didar Zowghi, and Bin Yin

Improving Software Quality Requirements Specifications Using Spectrum

Analysis 379

Haruhiko Kaiya and Atsushi Ohnishi

The Concepts and Ontology of SiSL: A Situation-Centric Specification

Language 385

Haihua Xie, Carl K. Chang, Hua Ming, and Kai-Shin Lu

A Functional Implementation Approach for Web Services-Based

Context-Aware Systems 392

Jianchu Huang and Hongji Yang

REFS 4: REFS Panel

Requirements Engineering for Service Adaptation and Evolution 398

Lin Liu

SAPSE 1

Modeling of A-Posteriori Access Control in Business Processes 403

Mohamed Karim Aroua and Belhassen Zouari

Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMN 409

Hejiao Huang and Qiang Zhou

Database as a Service: Towards a Unified Solution for Security Requirements 415

M. A. Hadavi, M. Noferesti, R. Jalili, and E. Damiani

xii

Page 10: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

SAPSE 2

Deriving Process-Related RBAC Models from Process Execution Histories 421

Anne Baumgrass, Sigrid Schefer-Wenzl, and Mark Strembeck

Approximation Algorithms for Minimizing the Number of Roles

and Administrative Assignments in RBAC 427

Hejiao Huang, Feng Shang, and Jiangtao Zhang

Robust XML Watermarking Using Fuzzy Queries 433

Tchokpon Romaric, Ernesto Damiani, and Nadia Bennani

STA2 Agile Software TestingModel Based Test Automation through Asynchronous Channels 439

Robert M. Hierons

Strategies for Agile Software Testing Automation: An Industrial Experience 440

Eliane Collins, Arilo Dias-Neto, and Vicente F. de Lucena Jr.

Adaptive Agile Performance Modeling and Testing 446

Marek G. Stochel, Mariusz R. Wawrowski, and James J. Waskiel

STA3 Testing Mobile and Open Software

Model-Based Conformance Testing of WS-BPEL Compositions 452

AfefJmal Maalej, Moez Krichen, and Mohamed Jma'fel

A Conceptual Framework for Open Source Software Test Process 458

Tamer Abdou, Peter Grogono, and Pankaj Kamthan

STA4 Testing Large Systems

Mining Data Chain Graph for Fault Localization 464

Bo Yang, Ji Wu, and Chao Liu

Effects of Class Imbalance in Test Suites: An Empirical Study

of Spectrum-Based Fault Localization 470

Cheng Gong, Zheng Zheng, Wei Li, and Peng Hao

lEESD-TiP 1

Load Balancing for Cross Layer Communication 476

John F. Schommer, Dominik Franke, Tim Lange, and Stefan Kowalewski

Development of a Mobile Platform to Support Building Maintenance

Engineering 482

Paul Stack

An Estimation Model for the Savings Achievable by Tool Chains 488

Matthias Biehl and Martin Tdrngren

xiii

Page 11: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

lEESD-TiP 2

GcLite: An Expert Tool for Analyzing Garbage Collection Behavior 493

Vasileios Angelopoulos, Trevor Parsons, John Murphy, and Pattrick O'Sullivan

Integration and Analysis of Design Artefacts in Embedded Software

Development 503

Daniel Merschen, Julian Pott, and Stefan Kowalewski

Product Line Variability Modeling Based on Model Difference and Merge 509

Kunming Nie, Li Zhang, and Zengtao Geng

CORCS 1

Performance Awareness in Component Systems: Vision Paper 514

Lubomir Bulej, Tomas Bures, Vojtech Horky, Jaroslav Keznikl, and Petr Tuma

Understanding the Role of Transmission Power in Component-Based

Architectures for Adaptive WSN 520

Guillermo Rodriguez-Navas, Miquel A. Ribot, and Bartomeu Alorda

Tool-Supported Methodology for Component-Based Design of Wireless

Sensor Network Applications 526

Steffen Peter and Peter Langenddrfer

CORCS 2

Extending EAST-ADL for Modeling and Analysis of System's Resource-Usage 532

Raluca Marinescu and Eduard Paul Enoiu

Modelling the Design for an SOA System to Control a Small Scale Energy

Zone 538

Maria Anjum and David Budgen

Rule Based Axiomatic Design Theory Guidance for Software Development 544

Cengiz Togay, Emre Selman Caniaz, and AH Hikmet Dogru

STPSA 1

Branch Obfuscation Using Code Mobility and Signal 553

Zhi Wang, Chunfu Jia, Min Liu, and Xiaoxu Yu

Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based

Limited Symbolic Evaluation 559

Sun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan,

and Hongyu Zhang

Towards a Secure Software Development Lifecycle with SQUARE+R 565

Welder D. Yu and Kyle Le

xiv

Page 12: 2012 IEEE 36th Annual Computer Software and Applications ... · Translation Rules anda Supporting ToolforModel-Based Reuse 310 JunfengZhao, JiantaoZhou, andJingLiu Parallel Software

STPSA 2

Internet-Based Evaluation and Prediction of Web Services Trustworthiness 571

Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, and Bing Xie

On Security Analysis of PHP Web Applications 577

David Hauzar and Jan Kofron

Measuring the Software Security Requirements Engineering Process 583

Nancy R. Mead

STPSA 3

Attack Model Based Penetration Test for SQL Injection Vulnerability 589

Wei Tian, Ju-Feng Yang, Jing Xu, and Guan-Nan Si

An Efficient Graph Codec System for Software Watermarking 595

Maria Chroni and Stavros D. Nikolopoulos

ESAS 1

Conditional Ontology Mapping 601

Islam Elgedawy

Integration of 3D Trajectory Maps into a Local Distribution Map of Radiation

Dose Using Unmanned Aerial Vehicle 607

Katsunori Oyama, Hiroyuki Wakabayashi, Atsushi Takeuchi, and Naoki Ishitsuka

A Load Balancing Scheme for Distributed Simulation Based on Multi-agent

System 613

Young Joon Lee, Geon Yong Park, Ho Kuen Song, and Hee Yong Youn

The Semantics of the Interaction between Agents and Web Services on

the Semantic Web 619

Sinem Getir, Moharram Challenger, Sebla Demirkol, and Geylani Kardas

ESAS 2

Integrating Linked Data Space with Agents Using the Environment Abstraction 625

Riza Cenk Erdur, Oguz Dikenelli, Oylum Alatli, Erdem Eser Ekinci, and Ziya Akar

An Image Processing Approach to Solve Labyrinth Discovery Robotics

Problem 631

Behnam Rahnama, Atilla Elgi, and Shadi Metani

Development of Semantic Model and Information Exploration System for TV

Media 637

Duygu Qelik, Atilla Elgi, Esra Calik, and Ayman Ahmad Khalil

Author Index .643