Learn More
The requirements for spontaneous interactions in open and dynamic systems create security issues and necessitate the incorporation of trust management into each software entity to make decisions. Trust encompasses various quality attributes (<i>e.g.</i>, security, competence, honesty) and helps in making appropriate decisions. In this paper, we present CAT,(More)
Software reuse through Application Programming Interfaces (APIs) is an integral part of software development. The functionality offered by an API is not always accessed uniformly throughout the lifetime of a client program. We propose Temporal API Usage Pattern Mining to detect API usage patterns in terms of their time of introduction into client programs.(More)
Software reuse through Application Programming Interfaces (APIs) is an integral part of software development. As developers write client programs, their understanding and usage of APIs change over time. Can we learn from long-term changes in how developers work with APIs in the lifetime of a client program? We propose Temporal API Usage Mining to detect(More)
Formal documentation can be a crucial resource for learning to how to use an API. However, producing high-quality documentation can be nontrivial. Researchers investigated how 10 common documentation problems manifested themselves in practice. The results are based on two surveys of a total of 323 professional software developers and analysis of 179 API(More)
Aspect mining aims at identifying cross-cutting concerns in existing systems and therefore advocates the adaption to an aspect-oriented design. This paper presents a case study examining three existing aspect mining techniques from the literature by applying them to four different open source java applications. We compare and evaluate the individual(More)
Model-based testing techniques play a vital role in producing quality software. However, compared to the testing of functional requirements, these techniques are not prevalent that much in testing software security. This paper presents a model-based approach to automatic testing of attack scenarios. An attack testing framework is proposed to model attack(More)
The open and dynamic nature of service-based software systems necessitates spontaneous and trustworthy interactions between collaborating entities. Service providers are exposed to users spanned across multiple organizational domains, so can be exploited by potentially untrustworthy service requestors. Given that, service providers need to trust requestors(More)
Tobacco consumption is harmful to health, and is one of the main causes of death in worldwide. It is evident that the prevalence of tobacco consumption is raising in most of low and middle income countries. Considering this, a cross sectional study was conducted in a selected urban area of southern Bangladesh with a view to assessing the prevalence of(More)
While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors for potential vulnerabilities they may invite to the total system. In this paper, we propose an Automatic Trust Monitoring algorithm called ATM(More)