scholarly journals An End User Development Approach for Mobile Web Augmentation

2017 ◽  
Vol 2017 ◽  
pp. 1-28 ◽  
Author(s):  
Gabriela Bosetti ◽  
Sergio Firmenich ◽  
Silvia E. Gordillo ◽  
Gustavo Rossi ◽  
Marco Winckler

The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based) functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features.We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.

2012 ◽  
Author(s):  
◽  
Adriana Elba Martín

Every day more and more users with different abilities and/or temporally or permanent disabilities are accessing the Web, and many of them have difficulties in reaching the desired information. However, the development of this kind of software is complicated for several reasons. Though some of them are technological, the majority are related with the need to compose different and, many times, unrelated design concerns which may be functional as in the case of most of the application’s requirements, or non- functional such as Accessibility. Even though, there is a huge number of tools and proposals to help developers assess Accessibility of Web applications, looking from the designer perspective, there is no such a similar situation. It seems that creating accessible Web sites is more expensive and complicated than creating Web sites and then assessing/modifying them. Although this feeling somehow seems to be true, addressing Accessibility at early design, not only has a significant impact on Web site quality, but also avoids subsequent efforts to return accessible fully developed applications. In this thesis, we present a novel approach to conceive, design and develop Accessible Web applications using concepts from Aspect-Orientation. In order to accomplish our goal, we provide some modelling techniques that we explicitly developed for handling the non-functional, generic and crosscutting characteristics of Accessibility. Specifically, we have enriched the UID technique with integration points to record Accessibility concerns that will be taken into account when designing the user interface. Then, by instantiating the SIG template with association tables, we work on an abstract interface model with Accessibility softgoals to obtain a concrete and accessible interface model for the Web application being developed. We use a real application example to illustrate our ideas and point out the advantages of a clear separation of concerns throughout the development life-cycle. Thus, our proposal is based on recognized design techniques, which we embedded in a software tool, in order to facilitate the transfer of the approach to the industry.


Author(s):  
Xunhua Wang ◽  
Hua Lin

Unlike existing password authentication mechanisms on the web that use passwords for client-side authentication only, password-authenticated key exchange (PAKE) protocols provide mutual authentication. In this article, we present an architecture to integrate existing PAKE protocols to the web. Our integration design consists of the client-side part and the server-side part. First, we implement the PAKE client-side functionality with a web browser plug-in, which provides a secure implementation base. The plug-in has a log-in window that can be customized by a user when the plug-in is installed. By checking the user-specific information in a log-in window, an ordinary user can easily detect a fake log-in window created by mobile code. The server-side integration comprises a web interface and a PAKE server. After a successful PAKE mutual authentication, the PAKE plug-in receives a one-time ticket and passes it to the web browser. The web browser authenticates itself by presenting this ticket over HTTPS to the web server. The plug-in then fades away and subsequent web browsing remains the same as usual, requiring no extra user education. Our integration design supports centralized log-ins for web applications from different web sites, making it appropriate for digital identity management. A prototype is developed to validate our design. Since PAKE protocols use passwords for mutual authentication, we believe that the deployment of this design will significantly mitigate the risk of phishing attacks.


2009 ◽  
Vol 3 (4) ◽  
pp. 29-42 ◽  
Author(s):  
Xunhua Wang ◽  
Hua Lin

Unlike existing password authentication mechanisms on the web that use passwords for client-side authentication only, password-authenticated key exchange (PAKE) protocols provide mutual authentication. In this article, we present an architecture to integrate existing PAKE protocols to the web. Our integration design consists of the client-side part and the server-side part. First, we implement the PAKE client-side functionality with a web browser plug-in, which provides a secure implementation base. The plug-in has a log-in window that can be customized by a user when the plug-in is installed. By checking the user-specific information in a log-in window, an ordinary user can easily detect a fake log-in window created by mobile code. The server-side integration comprises a web interface and a PAKE server. After a successful PAKE mutual authentication, the PAKE plug-in receives a one-time ticket and passes it to the web browser. The web browser authenticates itself by presenting this ticket over HTTPS to the web server. The plug-in then fades away and subsequent web browsing remains the same as usual, requiring no extra user education. Our integration design supports centralized log-ins for web applications from different web sites, making it appropriate for digital identity management. A prototype is developed to validate our design. Since PAKE protocols use passwords for mutual authentication, we believe that the deployment of this design will significantly mitigate the risk of phishing attacks.


2017 ◽  
Vol 2017 (3) ◽  
pp. 75-89 ◽  
Author(s):  
Kevin Corre ◽  
Olivier Barais ◽  
Gerson Sunyé ◽  
Vincent Frey ◽  
Jean-Michel Crom

Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue that increases the privacy violation is the lack of choice for the end-user to select its own IdP. Indeed, on many web-applications, the end-user can only select between a subset of IdPs, in most cases Facebook or Google. In this paper, we analyze this phenomena, in particular why the end-user cannot easily select its preferred IdP, though there exists standards in this field such as OpenID Connect and OAuth 2? To lead this analysis, we conduct three investigations. The first one is a field survey on OAuth 2 and OpenID Connect scope usage by web sites to understand if scopes requested by websites could allow for user defined IdPs. The second one tries to understand whether the problem comes from the OAuth 2 protocol or its implementations by IdP. The last one tries to understand if trust relations between websites and IdP could prevent the end user to select its own IdP. Finally, we sketch possible architecture for web browser based identity management, and report on the implementation of a prototype.


Author(s):  
Carmine Scavo ◽  
Jody Baumgartner

The World Wide Web has been widely adopted by local governments as a way to interact with local residents. The promise and reality of Web applications are explored in this chapter. Four types of Web utilizations are analyzed: bulletin board applications, promotion applications, service delivery applications, and citizen input applications. A survey of 145 municipal and county government Web sites originally conducted in 1998 was replicated in 2002, and then again in 2006. These data are used to examine how local governments are actually using the Web and to examine the evolution of Web usage over the 8-year span between the first and third survey. The chapter concludes that local governments have made progress in incorporating many of the features of the Web but that they have a long way to go in realizing its full promise.


Author(s):  
Roberto Sassano ◽  
Luis Olsina ◽  
Luisa Mich

The consistent modeling of quality requirements for Web sites and applications at different stages of the life cycle is still a challenge to most Web engineering researchers and practitioners. In the present chapter, we propose an integrated approach to specify quality requirements to Web sites and applications. By extending the ISO 9126-1 quality views characteristics, we discuss how to model internal, external quality, and quality in use views taking into account not only the software features, but also the own characteristics of Web applications. Particularly, we thoroughly analyze the modeling of the content characteristic for evaluating the quality of information–so critical for the whole Web application eras. The resulting model represents a first step towards a multi-dimensional integrated approach to evaluate Web sites at different lifecycle stages.


Author(s):  
J. Vijaya Sagar Reddy ◽  
G. Ramesh

Web applications are the most widely used software in the internet. When a web application is developed and deployed in the real environment, It is very severe if any bug found by the attacker or the customer or the owner of the web application. It is the very important to do the proper pre-analysis testing before the release. It is very costly thing if the proper testing of web application is not done at the development location and any bug found at the customer location. For web application testing the existing systems such as DART, Cute and EXE are available. These tools generate test cases by executing the web application on concrete user inputs. These tools are best suitable for testing static web sites and are not suitable for dynamic web applications. The existing systems needs user inputs for generating the test cases. It is most difficult thing for the human being to provide dynamic inputs for all the possible cases. This paper presents algorithms and implementation, and an experimental evaluation that revealed HTML Failures, Execution Failures, Includes in PHP Web applications.


2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


2019 ◽  
Vol 11 (7) ◽  
pp. 147 ◽  
Author(s):  
Masaki Kohana ◽  
Shinji Sakamoto ◽  
Shusuke Okamoto

Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.


2012 ◽  
Vol 3 (2) ◽  
pp. 40-56 ◽  
Author(s):  
Kevin Curran ◽  
Aaron Bond ◽  
Gavin Fisher

Accessing the Web from mobile devices is a popular practice. Trends show that the mobile space is becoming the method through which many consumers access content – both through native and web applications. These applications have expanded the browsing experience, but have also complicated the development process. A need exists for a simple, uniform solution which HTML5 is attempting to address. HTML is a mark-up language, now on its fifth edition, used for structuring and presenting content on the World Wide Web. Because of the large increase in users of mobile devices, internet access on these devices is widely used. The creation of web sites, web documents, and applications are done with HTML5, as it is compatible with both PC and mobile device browsers. However, with its lengthy development process, it is not yet apparent if HTML5 can incorporate the demands of developers in a changing environment. This paper provides an overview of the use of HTML5 in structuring and presenting content on the World Wide Web and compatibility issues on mobile browsers, key features, tool’s, and the advantages and disadvantages on the mobile web devices as well as the state of the mobile web.


Sign in / Sign up

Export Citation Format

Share Document