Table of Contents

Preface...... xix

Volume I

Section 1 Fundamental Concepts and Theories

Chapter 1 Basic Concepts on RIAs...... 1 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico

Chapter 2 Software Design...... 18 Rachita Misra, C.V. Raman College of Engineering, India Chhabi Rani Panigrahi, C.V. Raman College of Engineering, India Bijayalaxmi Panda, C.V. Raman College of Engineering, India Bibudhendu Pati, C.V. Raman College of Engineering, India

Chapter 3  Ten Years of Experience with Agile and Model-Driven Software Development in a Legacy Platform...... 57 Chung-Yeung Pang, Seveco AG, Switzerland

Chapter 4 Quality Attributes for Mobile Applications...... 90 João M. Fernandes, Universidade do Minho, Portugal André L. Ferreira, Universidade do Minho, Portugal

Chapter 5 An Overview of RIAs Development Tools...... 104 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico

  

Chapter 6  Teaching Software Architecture in Industrial and Academic Contexts: Similarities and Differences...... 138 Paolo Ciancarini, , Italy Stefano Russo, University of Naples Federico II, Italy

Chapter 7 An Agile Architecture for a Legacy Enterprise IT System...... 155 Chung-Yeung Pang, Seveco AG, Switzerland

Section 2 Development and Design Methodologies

Chapter 8  Method Using Command Abstraction Library for Iterative Testing Security of Web Applications...... 192 Seiji Munetoh, The Graduate University for Advanced Studies (SOKENDAI), Japan & IBM Research, Japan Nobukazu Yoshioka, National Institute of Informatics (NII), Japan & The Graduate University for Advanced Studies (SOKENDAI), Japan

Chapter 9 Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud...... 216 B. B. Gupta, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India Pooja Chaudhary, National Institute of Technology Kurukshetra, India

Chapter 10 Recovery and Refinement of Business Process Models for Web Applications...... 248 Alessandro Marchetto, Independent Researcher, Italy Chiara Di Francescomarino, Fondazione Bruno Kessler (CIT), Italy

Chapter 11  Performance Evaluation of Public IaaS Clouds for Web 2.0 Applications Using CloudStone Benchmark...... 292 Sanjay P. Ahuja, University of North Florida, USA Neha Soni, University of North Florida, USA

Chapter 12 An Empirical Study of the Effect of Design Patterns on Class Structural Quality...... 315 Liguo Yu, Indiana University – South Bend, USA Srini Ramaswamy, BU Power Generation at ABB, India 

Chapter 13 Attaining Semantic Enterprise Interoperability Through Ontology Architectural Patterns...... 335 Rishi Kanth Saripalle, University of Connecticut, USA Steven A. Demurjian, University of Connecticut, USA

Chapter 14 Countering Cross-Site Scripting in Web-Based Applications...... 370 Loye Lynn Ray, University of Maryland University College, USA

Chapter 15 Developing Security Enabled Applications for Web Commerce...... 384 Kannan Balasubramanian, Mepco Schlenk Engineering College, India

Chapter 16 Usability Software Engineering Testing Experimentation for Android-Based Web Applications: Usability Engineering Testing for Online Learning Management System...... 397 Hina Saeeda, National University of Sciences and Technology, Pakistan Fahim Arif, National University of Sciences and Technology, Pakistan Nasir Mehmood Minhas, Pir Mehr Ali Shah Arid Agriculture University, Pakistan

Chapter 17  A Method to Design a Software Process Architecture in a Multimodel Environment: An Overview...... 416 Mery Pesantes, Research Centre in Mathematics (CIMAT, A.C.), Mexico Jorge Luis Risco Becerra, University of São Paulo – Escola Politécnica, Brazil Cuauhtémoc Lemus, Research Centre in Mathematics (CIMAT, A.C.), Mexico

Chapter 18 An Alternative Threat Model-Based Approach for Security Testing...... 441 Bouchaib Falah, Al Akhawayn University, Morocco Mohammed Akour, Yarmouk University, Jordan Samia Oukemeni, Al Akhawayn University, Morocco

Chapter 19 An Integrated Development Environment for RFID Applications...... 455 Nikos Kefalakis, Athens Information Technology, Greece John Soldatos, Athens Information Technology, Greece

Chapter 20 A Roadmap on Awareness of Others in Accessible Collaborative Rich Internet Applications...... 479 Leonelo D. A. Almeida, Federal University of Technology-Paraná (UTFPR), Brazil M. Cecília C. Baranauskas, University of Campinas (UNICAMP), Brazil 

Chapter 21 A Generic Architectural Model Approach for Efficient Utilization of Patterns: Application in the Mobile Domain...... 501 Jouni Markkula, University of Oulu, Finland Oleksiy Mazhelis, University of Jyväskylä, Finland

Volume II

Chapter 22 User Interface Design in Isolation from Underlying Code and Environment...... 530 Izzat Alsmadi, University of Texas A&M, USA

Chapter 23 Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms: A Case Study from the Webinos Project...... 539 Andrea Atzeni, Politecnico di Torino, Italy John Lyle, University of Oxford, UK Shamal Faily, University of Oxford, UK

Chapter 24 Firefox OS Ecosystem: Ambitions and Limits of an Open Source Operating System for Mobile Devices...... 565 Ewa Janczukowicz, Orange Labs, France Ahmed Bouabdallah, Institut Mines-Telecom, France Arnaud Braud, Orange Labs, France Stéphane Tuffin, Orange Labs, France Jean-Marie Bonnin, Telecom Bretagne / IRISA, France

Chapter 25 Voice Application Generator Platform for Real Time Multimedia Vehicle Sensor Based Notifications...... 593 Guillermo Cueva-Fernandez, University of Oviedo, Spain Jordán Pascual Espada, University of Oviedo, Spain Vicente García-Díaz, University of Oviedo, Spain

Chapter 26 Design-Based Research with AGILE Sprints to Produce MUVES in Vocational Education...... 607 Todd Cochrane, Nelson Marlborough Institute of Technology, New Zealand Niki E. Davis, University of Canterbury, New Zealand Julie Mackey, University of Canterbury, New Zealand 

Chapter 27 Development of Data Mining Driven Software Tool to Forecast the Customer Requirement for Quality Function Deployment...... 625 Shivani K. Purohit, Manoharbhai Patel Institute of Engineering and Technology (MIET), India Ashish K. Sharma, Manoharbhai Patel Institute of Engineering and Technology (MIET), India

Chapter 28 HOD2MLC: Hybrid Ontology Design and Development Model With Lifecycle...... 659 Rishi Kanth Saripalle, Illinois State University, USA Steven A. Demurjian, University of Connecticut, USA Michael Blechner, University of Connecticut Health Center, USA Thomas Agresta, University of Connecticut Health Center, USA

Chapter 29 Component Based Model Driven Development: An Approach for Creating Mobile Web Applications From Design Models...... 686 Pablo Martin Vera, National University of La Matanza, Argentina

Chapter 30 Aspect-Oriented Programming (AOP) Support on RIAs Development...... 709 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico

Chapter 31 The Development of an Optimised Metadata Application Profile...... 727 Paul Walk, EDINA, University of Edinburgh, UK

Chapter 32 A Role of Enterprise Service Bus in Building Web Services...... 743 Dinesh Sharma, Amity University, Madhya Pradesh, India Devendra Kumar Mishra, Amity University, Madhya Pradesh, India

Chapter 33 Evaluation Methods for E-Learning Applications in Terms of User Satisfaction and Interface Usability...... 756 Nouzha Harrati, University of Souk Ahras, Imed Bouchrika, University of Souk Ahras, Algeria Zohra Mahfouf, University of Souk Ahras, Algeria Ammar Ladjailia, University of Souk Ahras, Algeria 

Chapter 34 Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications...... 778 Hossain Shahriar, Kennesaw State University, USA Hisham Haddad, Kennesaw State University, USA

Chapter 35 Design of the While Listening Activities in Interactive Multimedia Listening Software...... 798 Vehbi Turel, The University of Bingol, Turkey Atif Waraich, Manchester Metropolitan University, UK

Chapter 36 Quality Assurance in Agile Software Development...... 837 Iwona Dubielewicz, Wroclaw University of Technology, Poland Bogumiła Hnatkowska, Wroclaw University of Technology, Poland Zbigniew Huzar, Wroclaw University of Technology, Poland Lech Tuzinkiewicz, Wroclaw University of Technology, Poland

Section 3 Tools and Technologies

Chapter 37 A Web Backtracking Technique for Fraud Detection in Financial Applications...... 861 Tasawar Hussain, Mohammad Ali Jinnah University, Pakistan Sohail Asghar, COMSATS Institute of Information Technology, Pakistan

Chapter 38 Auditing Defense Against XSS Worms in Online Social Network-Based Web Applications...... 879 Pooja Chaudhary, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India B. B. Gupta, National Institute of Technology Kurukshetra, India

Chapter 39 BDS: Browser Dependent XSS Sanitizer...... 910 Shashank Gupta, National Institute of Technology Kurukshtra, India B. B. Gupta, National Institute of Technology Kurukshtra, India

Chapter 40 The Impact of Media Richness on the Usage of Web 2.0 Services for Knowledge Transfer...... 928 Albert Gyamfi, Aalborg University, Denmark

Chapter 41 Towards Automation of IoT Analytics: An Ontology-Driven Approach...... 947 Sounak Dey, TCS Research and Innovation, India Arijit Mukherjee, TCS Research and Innovation, India 

Chapter 42 Information Theoretic XSS Attack Detection in Web Applications...... 972 Hossain Shahriar, Kennesaw State University, USA Sarah North, Kennesaw State University, USA Wei-Chuen Chen, Kennesaw State University, USA Edward Mawangi, Kennesaw State University, USA

Chapter 43 Variant Logic for Model Driven Applications...... 988 Jon Davis, Curtin University, Australia Elizabeth Chang, Curtin University, Australia

Volume III

Chapter 44 Optimized and Distributed Variant Logic for Model-Driven Applications...... 1023 Jon Davis, Curtin University, Australia Elizabeth Chang, University of New South Wales, Australia & Australian Defence Force Academy, Australia

Chapter 45 An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications...... 1073 Romaric Ludinard, Supélec, France Éric Totel, Supélec, France Frédéric Tronel, Supélec, France Vincent Nicomette, CNRS, LAAS, France & INSA, LAAS, Université de Toulouse, France Mohamed Kaâniche, CNRS, LAAS, France & Université de Toulouse, France Éric Alata, CNRS, LAAS, France & INSA, LAAS, Université de Toulouse, France Rim Akrout, CNRS, LAAS, France & LAAS, Université de Toulouse, France Yann Bachy, CNRS, LAAS, France & LAAS, Université de Toulouse, France

Chapter 46 Characterizing PaaS Solutions Enabling Cloud Federations...... 1095 Tamas Pflanzner, University of Szeged, Hungary Roland Tornyai, University of Szeged, Hungary Ákos Zoltán Gorácz, University of Szeged, Hungary Attila Kertesz, University of Szeged, Hungary

Chapter 47 Combining Static Code Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps...... 1121 Marco Pistoia, IBM Corporation, USA Omer Tripp, IBM T. J. Watson Research Center, USA David Lubensky, IBM T. J. Watson Research Center, USA 

Chapter 48 An Empirical Study of Usability Metric for Websites...... 1148 Sukhpuneet Kaur, Punjab Technical University, India Kulwant Kaur, Punjab Technical University, India Hardeep Singh, Guru Nanak Dev University, India Parminder Kaur, Guru Nanak Dev University, India

Section 4 Utilization and Applications

Chapter 49 Quantitative Evaluation of Web2.0 Application...... 1174 Jibitesh Mishra, College of Engineering and Technology, India Kabita Rani Naik, College of Engineering and Technology, India

Chapter 50 Requirement Prioritization of Complex Web 2.0 Application Based on Effects on Regression Testing: A Hybrid Approach...... 1204 Varun Gupta, Jawaharlal Nehru Govt. Engineering College, India D.S. Chauhan, Uttarakhand Technical University, India Kamlesh Dutta, National Institute of Technology, India

Chapter 51 Leveraging Web 2.0 for Online Learning...... 1225 Prerna Lal, International Management Institute, India

Chapter 52 Prevention of SQL Injection Attacks in Web Browsers...... 1240 Kannan Balasubramanian, Mepco Schlenk Engineering College, India

Chapter 53 Web Service Evaluation Using Probabilistic Models...... 1275 S. Zimeras, University of the Aegean, Greece

Chapter 54 Analysis of Data Validation Techniques for Online Banking Services...... 1284 Shadi A Aljawarneh, Jordan University of Science and Technology, Jordan

Chapter 55 Adding More Agility to Software Product Line Methods: A Feasibility Study on Its Customization Using Agile Practices...... 1294 Kun Tian, University of Wisconsin, USA

Chapter 56 Web Application Vulnerabilities and Their Countermeasures...... 1312 Kannan Balasubramanian, Mepco Schlenk Engineering College, India 

Chapter 57 Bespoke Mobile Application Development: Facilitating Transition of Foundation Students to Higher Education...... 1343 Nevan Bermingham, Dublin Institute of Technology, Ireland Mark Prendergast, Trinity College Dublin, Ireland

Chapter 58 Investigating the Use of Web 2.0 Technologies and Their Presence in Saudi Government Agencies’ Websites...... 1371 Mohammed Altayar, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

Chapter 59 Mobile Health Applications Assisting Patients With Chronic Diseases: Examples From Asthma Care...... 1391 Petre Iltchev, Medical University of Lodz, Poland Andrzej Śliwczyński, Medical University of Lodz, Poland Potr Szynkiewicz, Prometriq Ltd., Poland Michał Marczak, Medical University of Lodz, Poland

Chapter 60 Web 2.0 Mash-Up System for Real Time Data Visualisation and Analysis Using OSS...... 1418 Wajid Khan, University of Bedfordshire, UK Fiaz Hussain, University of Bedfordshire, UK Edmond C. Prakash, University of Bedfordshire, UK

Section 5 Organizational and Social Implications

Chapter 61 Web 2.0 and Social Media in Today’s Business World...... 1443 Edward T. Chen, University of Massachusetts – Lowell, USA

Chapter 62  Success in the Web 2.0 Ecosystem: Exploring the State and Determinants in Indian Businesses...... 1466 Ashok Kumar Wahi, Jaypee Institute of Information Technology, India Rajnish Kumar Misra, Jaypee Institute of Information Technology, India

Chapter 63 A Simple Solution to Prevent Parameter Tampering in Web Applications...... 1491 Oğuzhan Menemencioğlu, Karabük University, Turkey İlhami Muharrem Orak, Karabük University, Turkey 

Chapter 64 Common Problems Faced When Developing Applications for Mobile Devices...... 1508 Kevin Curran, University of Ulster, UK Sean Carlin, University of Ulster, UK Joseph McMahon, University of Ulster, UK

Chapter 65 Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms...... 1525 Omkar Badve, National Institute of Technology Kurukshetra, India B. B. Gupta, National Institute of Technology Kurukshetra, India Shashank Gupta, National Institute of Technology Kurukshetra, India

Chapter 66 Factors Affecting the Adoption of Entertainment Mobile Applications in Iran: An Integrated Framework...... 1552 Sina Baghbaniyazdi, University of Tehran, Iran Amir Ekhlassi, University of Tehran, Iran Kamal Sakhdari, University of Tehran, Iran

Section 6 Emerging Trends

Chapter 67 Adaptive Future Internet Applications: Opportunities and Challenges for Adaptive Web Services Technology...... 1568 Clarissa Cassales Marquezan, The Ruhr Institute for Software Technology, Paluno, University of Duisburg-Essen, Germany Andreas Metzger, The Ruhr Institute for Software Technology, Paluno, University of Duisburg-Essen, Germany Klaus Pohl, The Ruhr Institute for Software Technology, Paluno, University of Duisburg- Essen, Germany Vegard Engen, IT Innovation Centre, University of Southampton, UK Michael Boniface, IT Innovation Centre, University of Southampton, UK Stephen C. Phillips, IT Innovation Centre, University of Southampton, UK Zlatko Zlatev, IT Innovation Centre, University of Southampton, UK

Chapter 68 Degree of Similarity of Web Applications...... 1590 Doru Anastasiu Popescu, University of Pitesti, Romania Dragos Nicolae, National College “Radu Greceanu” – Slatina, Romania 

Chapter 69 New Trends on RIAs Development...... 1598 Giner Alor-Hernández, Instituto Tecnológico de Orizaba, Mexico Viviana Yarel Rosales-Morales, Instituto Tecnológico de Orizaba, Mexico Luis Omar Colombo-Mendoza, Instituto Tecnológico de Orizaba, Mexico

Index...... xxi