Table of Contents
Preface...... xix
Volume I
Section 1 Fundamental Concepts and Theories
Chapter 1 Basic Concepts on RIAs...... 1 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico
Chapter 2 Software Design...... 18 Rachita Misra, C.V. Raman College of Engineering, India Chhabi Rani Panigrahi, C.V. Raman College of Engineering, India Bijayalaxmi Panda, C.V. Raman College of Engineering, India Bibudhendu Pati, C.V. Raman College of Engineering, India
Chapter 3 Ten Years of Experience with Agile and Model-Driven Software Development in a Legacy Platform...... 57 Chung-Yeung Pang, Seveco AG, Switzerland
Chapter 4 Quality Attributes for Mobile Applications...... 90 João M. Fernandes, Universidade do Minho, Portugal André L. Ferreira, Universidade do Minho, Portugal
Chapter 5 An Overview of RIAs Development Tools...... 104 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico
Chapter 6 Teaching Software Architecture in Industrial and Academic Contexts: Similarities and Differences...... 138 Paolo Ciancarini, University of Bologna, Italy Stefano Russo, University of Naples Federico II, Italy
Chapter 7 An Agile Architecture for a Legacy Enterprise IT System...... 155 Chung-Yeung Pang, Seveco AG, Switzerland
Section 2 Development and Design Methodologies
Chapter 8 Method Using Command Abstraction Library for Iterative Testing Security of Web Applications...... 192 Seiji Munetoh, The Graduate University for Advanced Studies (SOKENDAI), Japan & IBM Research, Japan Nobukazu Yoshioka, National Institute of Informatics (NII), Japan & The Graduate University for Advanced Studies (SOKENDAI), Japan
Chapter 9 Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud...... 216 B. B. Gupta, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India Pooja Chaudhary, National Institute of Technology Kurukshetra, India
Chapter 10 Recovery and Refinement of Business Process Models for Web Applications...... 248 Alessandro Marchetto, Independent Researcher, Italy Chiara Di Francescomarino, Fondazione Bruno Kessler (CIT), Italy
Chapter 11 Performance Evaluation of Public IaaS Clouds for Web 2.0 Applications Using CloudStone Benchmark...... 292 Sanjay P. Ahuja, University of North Florida, USA Neha Soni, University of North Florida, USA
Chapter 12 An Empirical Study of the Effect of Design Patterns on Class Structural Quality...... 315 Liguo Yu, Indiana University – South Bend, USA Srini Ramaswamy, BU Power Generation at ABB, India
Chapter 13 Attaining Semantic Enterprise Interoperability Through Ontology Architectural Patterns...... 335 Rishi Kanth Saripalle, University of Connecticut, USA Steven A. Demurjian, University of Connecticut, USA
Chapter 14 Countering Cross-Site Scripting in Web-Based Applications...... 370 Loye Lynn Ray, University of Maryland University College, USA
Chapter 15 Developing Security Enabled Applications for Web Commerce...... 384 Kannan Balasubramanian, Mepco Schlenk Engineering College, India
Chapter 16 Usability Software Engineering Testing Experimentation for Android-Based Web Applications: Usability Engineering Testing for Online Learning Management System...... 397 Hina Saeeda, National University of Sciences and Technology, Pakistan Fahim Arif, National University of Sciences and Technology, Pakistan Nasir Mehmood Minhas, Pir Mehr Ali Shah Arid Agriculture University, Pakistan
Chapter 17 A Method to Design a Software Process Architecture in a Multimodel Environment: An Overview...... 416 Mery Pesantes, Research Centre in Mathematics (CIMAT, A.C.), Mexico Jorge Luis Risco Becerra, University of São Paulo – Escola Politécnica, Brazil Cuauhtémoc Lemus, Research Centre in Mathematics (CIMAT, A.C.), Mexico
Chapter 18 An Alternative Threat Model-Based Approach for Security Testing...... 441 Bouchaib Falah, Al Akhawayn University, Morocco Mohammed Akour, Yarmouk University, Jordan Samia Oukemeni, Al Akhawayn University, Morocco
Chapter 19 An Integrated Development Environment for RFID Applications...... 455 Nikos Kefalakis, Athens Information Technology, Greece John Soldatos, Athens Information Technology, Greece
Chapter 20 A Roadmap on Awareness of Others in Accessible Collaborative Rich Internet Applications...... 479 Leonelo D. A. Almeida, Federal University of Technology-Paraná (UTFPR), Brazil M. Cecília C. Baranauskas, University of Campinas (UNICAMP), Brazil
Chapter 21 A Generic Architectural Model Approach for Efficient Utilization of Patterns: Application in the Mobile Domain...... 501 Jouni Markkula, University of Oulu, Finland Oleksiy Mazhelis, University of Jyväskylä, Finland
Volume II
Chapter 22 User Interface Design in Isolation from Underlying Code and Environment...... 530 Izzat Alsmadi, University of Texas A&M, USA
Chapter 23 Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms: A Case Study from the Webinos Project...... 539 Andrea Atzeni, Politecnico di Torino, Italy John Lyle, University of Oxford, UK Shamal Faily, University of Oxford, UK
Chapter 24 Firefox OS Ecosystem: Ambitions and Limits of an Open Source Operating System for Mobile Devices...... 565 Ewa Janczukowicz, Orange Labs, France Ahmed Bouabdallah, Institut Mines-Telecom, France Arnaud Braud, Orange Labs, France Stéphane Tuffin, Orange Labs, France Jean-Marie Bonnin, Telecom Bretagne / IRISA, France
Chapter 25 Voice Application Generator Platform for Real Time Multimedia Vehicle Sensor Based Notifications...... 593 Guillermo Cueva-Fernandez, University of Oviedo, Spain Jordán Pascual Espada, University of Oviedo, Spain Vicente García-Díaz, University of Oviedo, Spain
Chapter 26 Design-Based Research with AGILE Sprints to Produce MUVES in Vocational Education...... 607 Todd Cochrane, Nelson Marlborough Institute of Technology, New Zealand Niki E. Davis, University of Canterbury, New Zealand Julie Mackey, University of Canterbury, New Zealand
Chapter 27 Development of Data Mining Driven Software Tool to Forecast the Customer Requirement for Quality Function Deployment...... 625 Shivani K. Purohit, Manoharbhai Patel Institute of Engineering and Technology (MIET), India Ashish K. Sharma, Manoharbhai Patel Institute of Engineering and Technology (MIET), India
Chapter 28 HOD2MLC: Hybrid Ontology Design and Development Model With Lifecycle...... 659 Rishi Kanth Saripalle, Illinois State University, USA Steven A. Demurjian, University of Connecticut, USA Michael Blechner, University of Connecticut Health Center, USA Thomas Agresta, University of Connecticut Health Center, USA
Chapter 29 Component Based Model Driven Development: An Approach for Creating Mobile Web Applications From Design Models...... 686 Pablo Martin Vera, National University of La Matanza, Argentina
Chapter 30 Aspect-Oriented Programming (AOP) Support on RIAs Development...... 709 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico
Chapter 31 The Development of an Optimised Metadata Application Profile...... 727 Paul Walk, EDINA, University of Edinburgh, UK
Chapter 32 A Role of Enterprise Service Bus in Building Web Services...... 743 Dinesh Sharma, Amity University, Madhya Pradesh, India Devendra Kumar Mishra, Amity University, Madhya Pradesh, India
Chapter 33 Evaluation Methods for E-Learning Applications in Terms of User Satisfaction and Interface Usability...... 756 Nouzha Harrati, University of Souk Ahras, Algeria Imed Bouchrika, University of Souk Ahras, Algeria Zohra Mahfouf, University of Souk Ahras, Algeria Ammar Ladjailia, University of Souk Ahras, Algeria
Chapter 34 Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications...... 778 Hossain Shahriar, Kennesaw State University, USA Hisham Haddad, Kennesaw State University, USA
Chapter 35 Design of the While Listening Activities in Interactive Multimedia Listening Software...... 798 Vehbi Turel, The University of Bingol, Turkey Atif Waraich, Manchester Metropolitan University, UK
Chapter 36 Quality Assurance in Agile Software Development...... 837 Iwona Dubielewicz, Wroclaw University of Technology, Poland Bogumiła Hnatkowska, Wroclaw University of Technology, Poland Zbigniew Huzar, Wroclaw University of Technology, Poland Lech Tuzinkiewicz, Wroclaw University of Technology, Poland
Section 3 Tools and Technologies
Chapter 37 A Web Backtracking Technique for Fraud Detection in Financial Applications...... 861 Tasawar Hussain, Mohammad Ali Jinnah University, Pakistan Sohail Asghar, COMSATS Institute of Information Technology, Pakistan
Chapter 38 Auditing Defense Against XSS Worms in Online Social Network-Based Web Applications...... 879 Pooja Chaudhary, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India B. B. Gupta, National Institute of Technology Kurukshetra, India
Chapter 39 BDS: Browser Dependent XSS Sanitizer...... 910 Shashank Gupta, National Institute of Technology Kurukshtra, India B. B. Gupta, National Institute of Technology Kurukshtra, India
Chapter 40 The Impact of Media Richness on the Usage of Web 2.0 Services for Knowledge Transfer...... 928 Albert Gyamfi, Aalborg University, Denmark
Chapter 41 Towards Automation of IoT Analytics: An Ontology-Driven Approach...... 947 Sounak Dey, TCS Research and Innovation, India Arijit Mukherjee, TCS Research and Innovation, India
Chapter 42 Information Theoretic XSS Attack Detection in Web Applications...... 972 Hossain Shahriar, Kennesaw State University, USA Sarah North, Kennesaw State University, USA Wei-Chuen Chen, Kennesaw State University, USA Edward Mawangi, Kennesaw State University, USA
Chapter 43 Variant Logic for Model Driven Applications...... 988 Jon Davis, Curtin University, Australia Elizabeth Chang, Curtin University, Australia
Volume III
Chapter 44 Optimized and Distributed Variant Logic for Model-Driven Applications...... 1023 Jon Davis, Curtin University, Australia Elizabeth Chang, University of New South Wales, Australia & Australian Defence Force Academy, Australia
Chapter 45 An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications...... 1073 Romaric Ludinard, Supélec, France Éric Totel, Supélec, France Frédéric Tronel, Supélec, France Vincent Nicomette, CNRS, LAAS, France & INSA, LAAS, Université de Toulouse, France Mohamed Kaâniche, CNRS, LAAS, France & Université de Toulouse, France Éric Alata, CNRS, LAAS, France & INSA, LAAS, Université de Toulouse, France Rim Akrout, CNRS, LAAS, France & LAAS, Université de Toulouse, France Yann Bachy, CNRS, LAAS, France & LAAS, Université de Toulouse, France
Chapter 46 Characterizing PaaS Solutions Enabling Cloud Federations...... 1095 Tamas Pflanzner, University of Szeged, Hungary Roland Tornyai, University of Szeged, Hungary Ákos Zoltán Gorácz, University of Szeged, Hungary Attila Kertesz, University of Szeged, Hungary
Chapter 47 Combining Static Code Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps...... 1121 Marco Pistoia, IBM Corporation, USA Omer Tripp, IBM T. J. Watson Research Center, USA David Lubensky, IBM T. J. Watson Research Center, USA
Chapter 48 An Empirical Study of Usability Metric for Websites...... 1148 Sukhpuneet Kaur, Punjab Technical University, India Kulwant Kaur, Punjab Technical University, India Hardeep Singh, Guru Nanak Dev University, India Parminder Kaur, Guru Nanak Dev University, India
Section 4 Utilization and Applications
Chapter 49 Quantitative Evaluation of Web2.0 Application...... 1174 Jibitesh Mishra, College of Engineering and Technology, India Kabita Rani Naik, College of Engineering and Technology, India
Chapter 50 Requirement Prioritization of Complex Web 2.0 Application Based on Effects on Regression Testing: A Hybrid Approach...... 1204 Varun Gupta, Jawaharlal Nehru Govt. Engineering College, India D.S. Chauhan, Uttarakhand Technical University, India Kamlesh Dutta, National Institute of Technology, India
Chapter 51 Leveraging Web 2.0 for Online Learning...... 1225 Prerna Lal, International Management Institute, India
Chapter 52 Prevention of SQL Injection Attacks in Web Browsers...... 1240 Kannan Balasubramanian, Mepco Schlenk Engineering College, India
Chapter 53 Web Service Evaluation Using Probabilistic Models...... 1275 S. Zimeras, University of the Aegean, Greece
Chapter 54 Analysis of Data Validation Techniques for Online Banking Services...... 1284 Shadi A Aljawarneh, Jordan University of Science and Technology, Jordan
Chapter 55 Adding More Agility to Software Product Line Methods: A Feasibility Study on Its Customization Using Agile Practices...... 1294 Kun Tian, University of Wisconsin, USA
Chapter 56 Web Application Vulnerabilities and Their Countermeasures...... 1312 Kannan Balasubramanian, Mepco Schlenk Engineering College, India
Chapter 57 Bespoke Mobile Application Development: Facilitating Transition of Foundation Students to Higher Education...... 1343 Nevan Bermingham, Dublin Institute of Technology, Ireland Mark Prendergast, Trinity College Dublin, Ireland
Chapter 58 Investigating the Use of Web 2.0 Technologies and Their Presence in Saudi Government Agencies’ Websites...... 1371 Mohammed Altayar, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia
Chapter 59 Mobile Health Applications Assisting Patients With Chronic Diseases: Examples From Asthma Care...... 1391 Petre Iltchev, Medical University of Lodz, Poland Andrzej Śliwczyński, Medical University of Lodz, Poland Potr Szynkiewicz, Prometriq Ltd., Poland Michał Marczak, Medical University of Lodz, Poland
Chapter 60 Web 2.0 Mash-Up System for Real Time Data Visualisation and Analysis Using OSS...... 1418 Wajid Khan, University of Bedfordshire, UK Fiaz Hussain, University of Bedfordshire, UK Edmond C. Prakash, University of Bedfordshire, UK
Section 5 Organizational and Social Implications
Chapter 61 Web 2.0 and Social Media in Today’s Business World...... 1443 Edward T. Chen, University of Massachusetts – Lowell, USA
Chapter 62 Success in the Web 2.0 Ecosystem: Exploring the State and Determinants in Indian Businesses...... 1466 Ashok Kumar Wahi, Jaypee Institute of Information Technology, India Rajnish Kumar Misra, Jaypee Institute of Information Technology, India
Chapter 63 A Simple Solution to Prevent Parameter Tampering in Web Applications...... 1491 Oğuzhan Menemencioğlu, Karabük University, Turkey İlhami Muharrem Orak, Karabük University, Turkey
Chapter 64 Common Problems Faced When Developing Applications for Mobile Devices...... 1508 Kevin Curran, University of Ulster, UK Sean Carlin, University of Ulster, UK Joseph McMahon, University of Ulster, UK
Chapter 65 Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms...... 1525 Omkar Badve, National Institute of Technology Kurukshetra, India B. B. Gupta, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India
Chapter 66 Factors Affecting the Adoption of Entertainment Mobile Applications in Iran: An Integrated Framework...... 1552 Sina Baghbaniyazdi, University of Tehran, Iran Amir Ekhlassi, University of Tehran, Iran Kamal Sakhdari, University of Tehran, Iran
Section 6 Emerging Trends
Chapter 67 Adaptive Future Internet Applications: Opportunities and Challenges for Adaptive Web Services Technology...... 1568 Clarissa Cassales Marquezan, The Ruhr Institute for Software Technology, Paluno, University of Duisburg-Essen, Germany Andreas Metzger, The Ruhr Institute for Software Technology, Paluno, University of Duisburg-Essen, Germany Klaus Pohl, The Ruhr Institute for Software Technology, Paluno, University of Duisburg- Essen, Germany Vegard Engen, IT Innovation Centre, University of Southampton, UK Michael Boniface, IT Innovation Centre, University of Southampton, UK Stephen C. Phillips, IT Innovation Centre, University of Southampton, UK Zlatko Zlatev, IT Innovation Centre, University of Southampton, UK
Chapter 68 Degree of Similarity of Web Applications...... 1590 Doru Anastasiu Popescu, University of Pitesti, Romania Dragos Nicolae, National College “Radu Greceanu” – Slatina, Romania
Chapter 69 New Trends on RIAs Development...... 1598 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico
Index...... xxi