User Session Data based Web Applications Test with Cluster Analysis

Author(s):  
Jin-hua Li ◽  
Dan-dan Xing
2007 ◽  
Vol 33 (10) ◽  
pp. 643-658 ◽  
Author(s):  
Sreedevi Sampath ◽  
Sara Sprenkle ◽  
Emily Gibson ◽  
Lori Pollock ◽  
Amie Souter Greenwald

2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Muhammad Bilal ◽  
Muhammad Asif ◽  
Abid Bashir

It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session hijacking situation because in other existing OpenID communication methods such double factor authentication has more chances of valid user session hijacked. The proposed communication protocol secures the OpenID URL with the help of additional innovative parameters such as Special Alphanumeric String (SAS) and Special Security PIN (SSP). The anticipated triple authentication protocol authenticated client unique OpenID URL at OpenID Provider (OP) side once and SAS and SSP field at Relying Party (RP) side. The anticipated protocol provides unique Single-Sign-On (SSO) services to OpenID users. The experimental website is tested by experts of web developers for avoiding session hijacking situation in the presence of hackers. The findings demonstrated that Dense Authentication Authorization and Accounting (DAAA) protocol minimizes the risk of a session hijacking in OpenID communication environment.


Author(s):  
Sreedevi Sampath ◽  
Renee C. Bryce ◽  
Gokulanand Viswanath ◽  
Vani Kandimalla ◽  
A. Gunes Koru

2011 ◽  
Vol 18 (4) ◽  
pp. 549-557 ◽  
Author(s):  
Takafumi Kubota ◽  
Takayuki Hayashi ◽  
Tomoyuki Tarumi

Author(s):  
P.DILEEP KUMAR REDDY ◽  
A. ANANDA RAO

Web and Event-driven applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate web applications can be considered as input, change their state, and produce an output. Examples include web applications, graphical user interfaces (GUIs), network protocols, device drivers, and embedded applications. Testing for functional correctness of EDS such as stand-alone GUI and web-based applications is critical to many organizations. These applications share several important characteristics. Both are particularly challenging to test because users can invoke many different sequences of events that affect application behavior. Hence here a novel model is provided to rank the test cases based on their prioritization.


Sign in / Sign up

Export Citation Format

Share Document