- Software Testing and Debugging Techniques
- Software System Performance and Reliability
- Access Control and Trust
- Software Engineering Research
- Software Reliability and Analysis Research
- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Privacy-Preserving Technologies in Data
- Advanced Software Engineering Methodologies
- Privacy, Security, and Data Protection
- Web Application Security Vulnerabilities
- Security and Verification in Computing
- Software Engineering Techniques and Practices
- Cloud Data Security Solutions
- Cloud Computing and Resource Management
- Smart Grid Security and Resilience
- Semantic Web and Ontologies
- Advanced Malware Detection Techniques
- Digital Rights Management and Security
- IoT and Edge/Fog Computing
- Model-Driven Software Engineering Techniques
- Scientific Computing and Data Management
- Flexible and Reconfigurable Manufacturing Systems
- Information and Cyber Security
- Data Quality and Management
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo"
2016-2025
National Research Council
2014-2025
University of Pisa
2018-2023
Consorzio Pisa Ricerche
2019
Institute of Scientific and Technical Information of China
2012
Consorzio Roma Ricerche
2011
National Academies of Sciences, Engineering, and Medicine
2006
Italtel (Italy)
2002
Web services (WSs) are the W3C-endorsed realization of Service-Oriented Architecture (SOA). Since they supposed to be implementation-neutral, WSs typically tested black-box at their interface. Such an interface is generally specified in XML-based notation called WS Description Language (WSDL). Conceptually, these WSDL documents eligible for fully automated test generation using syntax-based testing approaches. Towards such goal, we introduce WS-TAXI framework, which combine coverage...
The way people access services in indoor environments has dramatically changed the last year. countermeasures to COVID-19 pandemic imposed a disruptive requirement, namely preserving social distance among environments. We explore this work possibility of adopting localization technologies measure users discuss how information about people's contacts collected can be exploited during three stages: before, during, and after service. present reference architecture for an Indoor Localization...
Both in the component- and object-based contexts it is extremely important to derive as early possible suitable test cases based on UML specifications available during development. In this paper we focus integrated use of Sequence State Diagrams for deriving a "reasonably" complete reference model, which will then be used automatically cases. The approach meant overcome some limitations previously proposed model-based testing solutions, specifically conceived industrial contexts,...
Service Oriented Architectures (SOAs) are becoming increasingly popular and powerful. Fueling that growth is the availability of independent web services can be cost-effectively composed with other to provide richer functionality. The reasons make these systems easier build, however, also them more challenging test. Independent usually just an interface, enough invoke develop some general (black-box) tests, but insufficient for a tester adequate understanding integration quality between...
Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used recognize and track the activities that people perform during day, allow communication cooperation of physical objects. Usually, available infrastructures applications leveraging these smart environments have a critical impact on overall cost construction, require be preferably installed home construction still not user-centric. In this paper, we propose low...
We present the XML-based partition testing (XPT) approach for automatic generation of XML instances from a schema. The is inspired by well-known category method black-box testing. generated can be used inter-operability applications that expect in input conforming instances, as well other interesting purposes, such database population, Schema benchmarking, Web services testing, and so on. implementation XPT prototype tool called TAXI described. To limit number also incorporates practical...
A widely adopted security mechanism is the specification of access control policies by means XACML language. In this paper, we propose a framework, called X-CREATE, for systematic generation test inputs (XACML requests). Differently from existing tools, XCREATE exploits Context Schema. particular, tool applies XML-based methodology (XPT) to systematically produce set intermediate instances, covering Moreover, request generation, X-CREATE procedure parsing policy under and assigning values...
Testing of security policies is a critical activity and mutation analysis an effective approach for measuring the adequacy test suite. In this paper, we propose set operators addressing specific faults XACML 2.0 access control policy tool, called XACMUT (XACml MUTation) creating mutants. The tool generates mutants, provides facilities to run given suite on mutants computes effectiveness in terms score. includes enhances existing approaches.
Access control policies are usually specified by the XACML language. However, policy definition could be an error prone process, because of many constraints and rules that have to specified. In order increase confidence on defined policies, accurate testing activity a valid solution. The typical is performed deriving specific test cases, i.e. requests, executed means PDP implementation, so evidence possible security lacks or problems. Thus fault detection effectiveness derived suite...
The trustworthiness of sensitive data needs to be guaranteed and testing is a common activity among privacy protection solutions, even if quite expensive. Accesses resources are ruled by the policy decision point (PDP), which relies on eXtensible Access Control Markup Language (XACML) standard language for specifying access rights. In this study, authors propose strategy automatically deriving test requests from XACML describe their pilot experience in automation using strategy. Considering...
The specification of access control policies with the XACML language could be an error prone process, so a testing is usually solution for increasing confidence on policy itself. In this paper, we compare two methodologies deriving test cases testing, i.e. requests, that are implemented in X-CREATE tool. We consider simple combinatorial strategy and XML-based approach (XPT) which exploit values Context Schema. A stopping criterion generation also provided used comparison strategies terms...
Nowadays, more and industrial organizations are using Business Process Model Notation (BPMN) for process modeling. Key performance Indicators (KPIs) seton such models so to get a quantitative assessment of critical success metrics. A timely reliable monitoring KPIs is instrumental (BP) management, several frameworks being proposed purpose. solutions can be embedded into the Modeling (BPM) execution framework or integrated as additional facilities. This paper presents an that allows modeling,...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Context</i> : Intelligent monitoring systems can effectively predict or detect anomalies and issues in smart working ecosystems implement the proper countermeasures. However, for their effective efficient use, attributes like responsiveness, performance, quality should be properly tested assessed before integrating system into an ecosystem....
Abstract Context: Predicting security and trust vulnerabilities issues is crucial for IoT interconnected systems ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions by using a smart monitoring framework continuously verify functional non-functional property violations during the executions of their Method: This paper presents set guidelines Smart Monitoring Framework definition its application process. Results...