Maintaining web application: an ontology‐based reverse engineering approach

2009 ◽  
Vol 5 (4) ◽  
pp. 495-517 ◽  
Author(s):  
Sidi Mohamed Benslimane ◽  
Mimoun Malki ◽  
Djelloul Bouchiha

PurposeWeb applications are subject to continuous changes and rapid evolution triggered by increasing competition, especially in commercial domains such as electronic commerce. Unfortunately, usually they are implemented without producing any useful documentation for subsequent maintenance and evolution. Thereof, the maintenance of such systems becomes a challenging problem as the complexity of the web application grows. Reverse engineering has been heralded as one of the most promising technologies to support effective web application maintenance. This paper aims to present a reverse engineering approach that helps understanding existing undocumented web applications to be maintained or evolved.Design/methodology/approachThe proposed approach provides reverse engineering rules to generate a conceptual schema from a given domain ontology by using a set of transformation rules. The reverse engineering process consists of four phases: extracting useful information; identifying a set of ontological constructs representing the concepts of interest; enriching the identified set by additional constructs; and finally deriving a conceptual schema.FindingsThe advantage of using ontology for conceptual data modeling is the reusability of domain knowledge. As a result, the conceptual data model will be made faster, easier and with fewer errors than creating it in usual way. Designers can use the extracted conceptual schema to gain a better understanding of web applications and to assist in their maintenance.Originality/valueThe strong point of this approach is that it relies on a very rich semantic reference that is domain ontology. However, it is not possible to make a straightforward transformation of all elements from a domain ontology into a conceptual data model because ontology is semantically richer than data conceptual models.

2014 ◽  
Vol 22 (5) ◽  
pp. 431-449 ◽  
Author(s):  
Ammar Alazab ◽  
Michael Hobbs ◽  
Jemal Abawajy ◽  
Ansam Khraisat ◽  
Mamoun Alazab

Purpose – The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened. Design/methodology/approach – A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS). Findings – After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system. Research limitations/implications – Data limitation. Originality/value – The contributions of this paper are to first address the problem of web application vulnerabilities. Second, to propose a combination of an SIDS and an AIDS, namely, the IIDPS. Third, this paper presents a novel approach by connecting the IIDPS with a response action using fuzzy logic. Fourth, use the risk assessment to determine an appropriate response action against each attack event. Combining the system provides a better performance for the Intrusion Detection System, and makes the detection and prevention more effective.


2021 ◽  
Vol 2131 (2) ◽  
pp. 022077
Author(s):  
M V Stupina ◽  
K V Anistratenko ◽  
L O Pazina

Abstract Nowadays, the technology of QR codes is one of the promising areas of development of the IT industry, which has found application in various industries, business areas, medicine, etc. In the field of education, QR codes are used to increase the interactivity of classes, provide additional multimedia content, conduct surveys and other control activities. This work presents the key features of QR codes, their architecture and main components. The use of QR codes in automating the process of accounting for students’ attendance is considered. A web application has been developed for teachers, the interface of which allows them to generate QR codes for academic disciplines. A mobile application with an integrated QR-code scanner was developed for students. All attendance data is recorded in the teacher’s electronic attendance register. A conceptual data model of the system is presented, as well as the main algorithms of its operation related to the generation and scanning of QR codes. The practice of using the developed system demonstrates the effectiveness of monitoring attendance data by promptly entering it into an electronic journal.


2021 ◽  
Vol 47 ◽  
Author(s):  
Justas Trinkūnas ◽  
Olegas Vasilecas

The paper analyses graph oriented ontology transformation into conceptual data model. A number of methodswere proposed to develop conceptual datamodels, but only fewdealswith knowledge reuse. In this paperwe present an approach for knowledge represented by ontology automatic transformation into conceptual data model. The graph transformation language is presented and adapted for formal transformation of ontology into conceptualmodel. Details and examples of proposed ontology transformation into conceptual data model are presented.


2012 ◽  
Vol 268-270 ◽  
pp. 1661-1666
Author(s):  
Chuan Sheng Zhou

During web applications developed and deployed in many and many enterprises today, how to make sure their web applications satisfied to their individual and specific business requirements and marketing changes has been become a major problem. As now a lot of web applications are only designed and developed for specific business and they are normally high-coupled together with very bad system opening, collaboration, and flexibility. Here, by research on XML based web application design with software bus, component and workflow technologies, with multiple tiers layout and from user interface flexibility, business flow flexibility and data model flexibility, it illustrates a new way for a flexible web application design and try to improve web application flexibilities and to enhance enterprise satisfaction to their applications meeting with their business and marketing changes.


2016 ◽  
Vol 34 (1) ◽  
pp. 164-171 ◽  
Author(s):  
Mathew Miles

Purpose – Many libraries have a need to develop their own data-driven web applications, but their technical staff often lacks the required specialized training – which includes knowledge of SQL, a web application language like PHP, JavaScript, CSS, and jQuery. The web2py framework greatly reduces the learning curve for creating data-driven websites by focussing on three main goals: ease of use; rapid development; and security. web2py follows a strict MVC framework where the controls and web templates are all written in pure Python. No additional templating language is required. The paper aims to discuss these issues. Design/methodology/approach – There are many frameworks available for creating database-driven web applications. The author had used ColdFusion for many years but wanted to move to a more complete web framework which was also open source. Findings – After evaluating a number of Python frameworks, web2py was found to provide the best combination of functionality and ease of use. This paper focusses on the strengths of web2py and not the specifics of evaluating the different frameworks. Practical implications – Librarians who feel that they do not have the skills to create data-driven websites in other frameworks might find that they can develop them in web2py. It is a good web application framework to start with, which might also provide a gateway to other frameworks. Originality/value – web2py is an open source framework that could have great benefit for those who may have struggled to create database-driven websites in other frameworks or languages.


Informatica ◽  
2007 ◽  
Vol 18 (4) ◽  
pp. 511-534 ◽  
Author(s):  
Sidi Mohamed Benslimane ◽  
Mimoun Malki ◽  
Mustapha Kamal Rahmouni ◽  
Djamal Benslimane

Author(s):  
Yogesh Kumar ◽  
Anumalla Sandeep Satyanarayana ◽  
Ankit Kumar ◽  
Vikas Sharma

With the rapid evolution of technology, almost every business is now online connecting them to the widest and narrow corners of the world. Therefore, instead of physical security, their online security is a pivotal concern the business which all depends on the web applications security. Web application attacks and their risks have become normal since past many years, and the security of web applications has received increased attentions at present. Many attacks work on real time and mostly prevention mechanisms focus on prevention and detection of these attacks on the web applications. This research focuses on giving attention to the top 10 threats that organizations need to know and to ensure the web applications are protected from these risks and attacks.


2017 ◽  
Vol 117 (1) ◽  
pp. 166-197 ◽  
Author(s):  
Alessandro Annarelli ◽  
Cinzia Battistella ◽  
Fabio Nonino

Purpose The purpose of this paper is to propose an in-depth analysis of online communities of practice that support the innovative development of web applications. The analysis is aimed at understanding the preeminent characteristics of communities of practice that can favour the process of innovation (conceptualisation and realization of a web application) and if these characteristics differ in the diverse phases of a software development project (requirement specification, design, implementation and verification). Design/methodology/approach The authors adopted a multiple case study research design, selected 29 communities of practice related to the development of web applications and classified them recognizing the different practices that refer to the different phases of the innovation process of web-applications software development. Finally, the authors focussed on seven communities comparing five important dimensions for each one. Findings The results of the empirical analysis show that the best practices are different, considering the different phases of the project, and that these practices can be strategies directed at members to attract them and also, strategies directed at the community to permit collaboration. Originality/value The paper proposes an important and new insight into the management of virtual communities of practice (VCoP). The authors supposed that the ways to manage a VCoP could depend on project phases. In particular, the management practices of community should differ according to the different project phases, i.e. requirements specification, design, implementation and verification of the software. Literature in this sense presented only research focussed on the different effects of virtualness on teams depending on the length of team duration and on communication efforts.


2008 ◽  
Vol 46 ◽  
pp. 102-114
Author(s):  
Rūta Dubauskaitė ◽  
Olegas Vasilecas

Žiniatinklio paslaugų sistemos, kurių funkcionalumas yra panašus, dažnai yra kuriamos nenaudojant kitų įmonių sukauptų panašių dalykinių sričių žinių. Dėl to sistemose pasikartoja tų pačių klaidų, pavyzdžiui, nustatomi ir vėliau sistemoje naudojami ne visi svarbūs koncepcinio duomenų modelio objektai bei sukuriamas netikslus ir neišsamus verslo taisyklių rinkinys. Siekiant išspręsti paminėtas problemas kuriant informacines sistemas siūloma naudoti dalykinės srities ontologiją. Šiame darbe ontologijų taikymo būdas derinamas su žiniatinklio paslaugų sistemomis, šitaip siekiama pagerinti jų kūrimo procesą. Atliekant tyrimą buvo siekiama geriau suprasti žiniatinklio paslaugų sistemoje taikomas taisykles ir parinkti dalykinės srities ar žiniatinklio paslaugų ontologiją, kuri galėtų būti tinkama nustatant taisykles. Todėl žiniatinklio paslaugų sistemos taisykles suskirstėme į sąveikos, verslo logikos, naudojimo, prieigos ir sekų taisyklių klases. Sąveikos taisyklių klasei nustatyti siūloma naudoti žiniatinklio paslaugų ontologiją, verslo logikos, naudojimo, prieigos taisyklėms išgauti – dalykinės srities ontologiją, o nustatant sekų klasės taisykles gali būti naudojamos abi minėtosios ontologijų rūšys. Pasiūlytas ontologijų naudojimo žiniatinklio paslaugų sistemoje būdas patikrintas kuriant publikacijų e. bibliotekos koncepcinį duomenų modelį ir taisyklių rinkinį.Pagrindiniai žodžiai: žiniatinklio paslauga, ontologija, verslo taisyklė, koncepcinis duomenų modelis.Ontology-based web services system developmentRūta Dubauskaitė, Olegas Vasilecas Summary Web services systems are often created from scratch despite of already existing systems with similar functions. Therefore the same mistakes can arise in development of the systems, for example: important concepts of data model are not defined, incorrect rules model are created. Ontology is proposed to use in the development of information system for getting domain knowledge.The ways of using ontology in the development of web services systems are analyzed in the paper. The aim of this research is to improve the process of web services system development. The analysis of web services, ontology and business rules shows that it is advisable to use ontology to create set of business rules, conceptual data model.We propose to classify the rules of web services systems in order to better understand them and choose better ontology for their elicitation. In the paper ontology approach is applied for web services systems. It is proposed to use domain ontology for elicitation of domain, access, usage and orchestration rules, web services ontology can help to elicit choreography and orchestration rules. Suggested approach is examined developing prototype of university e. publication web services system. Suggested classification of web services systems rules enables easier to elicit rules and allows choosing suitable source of rules (web service ontology or domain ontology). It is found that using ontology in development process of web services systems allows creating more correct set of rules and conceptual data model.


Author(s):  
S. Vitalis ◽  
A. Labetski ◽  
F. Boersma ◽  
F. Dahle ◽  
X. Li ◽  
...  

Abstract. As web applications become more popular, 3D city models would greatly benefit from a proper web-based solution to visualise and manage them. CityJSON was introduced as a JSON encoding of the CityGML data model and promises, among several benefits, the ability to be integrated with modern web technologies. In order to provide an implementation of a web application for CityJSON data, that can be used as a reference for other applications, we developed ninja. It is a web application that allows the user to easily load and investigate a CityJSON model through a web browser. In addition, it offers support for a complex feature of CityJSON: the experimental versioning mechanism. In this paper, we describe the motivation, requirements, technical aspects and achieved functionality of ninja. We believe that such a web application can facilitate the adoption of 3D city models by more practitioners and decision makers.


Sign in / Sign up

Export Citation Format

Share Document