Eda Marchetti

ORCID: 0000-0003-4223-8036
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Software System Performance and Reliability
  • Access Control and Trust
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Advanced Software Engineering Methodologies
  • Privacy, Security, and Data Protection
  • Web Application Security Vulnerabilities
  • Security and Verification in Computing
  • Software Engineering Techniques and Practices
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • Smart Grid Security and Resilience
  • Semantic Web and Ontologies
  • Advanced Malware Detection Techniques
  • Digital Rights Management and Security
  • IoT and Edge/Fog Computing
  • Model-Driven Software Engineering Techniques
  • Scientific Computing and Data Management
  • Flexible and Reconfigurable Manufacturing Systems
  • Information and Cyber Security
  • Data Quality and Management

Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo"
2016-2025

National Research Council
2014-2025

University of Pisa
2018-2023

Consorzio Pisa Ricerche
2019

Institute of Scientific and Technical Information of China
2012

Consorzio Roma Ricerche
2011

National Academies of Sciences, Engineering, and Medicine
2006

Italtel (Italy)
2002

Web services (WSs) are the W3C-endorsed realization of Service-Oriented Architecture (SOA). Since they supposed to be implementation-neutral, WSs typically tested black-box at their interface. Such an interface is generally specified in XML-based notation called WS Description Language (WSDL). Conceptually, these WSDL documents eligible for fully automated test generation using syntax-based testing approaches. Towards such goal, we introduce WS-TAXI framework, which combine coverage...

10.1109/icst.2009.28 article EN International Conference on Software Testing, Verification, and Validation 2009-04-01

The way people access services in indoor environments has dramatically changed the last year. countermeasures to COVID-19 pandemic imposed a disruptive requirement, namely preserving social distance among environments. We explore this work possibility of adopting localization technologies measure users discuss how information about people's contacts collected can be exploited during three stages: before, during, and after service. present reference architecture for an Indoor Localization...

10.1016/j.array.2020.100051 article EN cc-by-nc-nd Array 2021-01-23

Both in the component- and object-based contexts it is extremely important to derive as early possible suitable test cases based on UML specifications available during development. In this paper we focus integrated use of Sequence State Diagrams for deriving a "reasonably" complete reference model, which will then be used automatically cases. The approach meant overcome some limitations previously proposed model-based testing solutions, specifically conceived industrial contexts,...

10.1016/j.entcs.2004.02.084 article EN Electronic Notes in Theoretical Computer Science 2005-01-01

Service Oriented Architectures (SOAs) are becoming increasingly popular and powerful. Fueling that growth is the availability of independent web services can be cost-effectively composed with other to provide richer functionality. The reasons make these systems easier build, however, also them more challenging test. Independent usually just an interface, enough invoke develop some general (black-box) tests, but insufficient for a tester adequate understanding integration quality between...

10.1145/1595696.1595721 article EN 2009-08-24

Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used recognize and track the activities that people perform during day, allow communication cooperation of physical objects. Usually, available infrastructures applications leveraging these smart environments have a critical impact on overall cost construction, require be preferably installed home construction still not user-centric. In this paper, we propose low...

10.3390/s18061886 article EN cc-by Sensors 2018-06-08

We present the XML-based partition testing (XPT) approach for automatic generation of XML instances from a schema. The is inspired by well-known category method black-box testing. generated can be used inter-operability applications that expect in input conforming instances, as well other interesting purposes, such database population, Schema benchmarking, Web services testing, and so on. implementation XPT prototype tool called TAXI described. To limit number also incorporates practical...

10.1109/ast.2007.6 article EN 2007-05-01

A widely adopted security mechanism is the specification of access control policies by means XACML language. In this paper, we propose a framework, called X-CREATE, for systematic generation test inputs (XACML requests). Differently from existing tools, XCREATE exploits Context Schema. particular, tool applies XML-based methodology (XPT) to systematically produce set intermediate instances, covering Moreover, request generation, X-CREATE procedure parsing policy under and assigning values...

10.1109/seaa.2010.58 article EN 2010-09-01

Testing of security policies is a critical activity and mutation analysis an effective approach for measuring the adequacy test suite. In this paper, we propose set operators addressing specific faults XACML 2.0 access control policy tool, called XACMUT (XACml MUTation) creating mutants. The tool generates mutants, provides facilities to run given suite on mutants computes effectiveness in terms score. includes enhances existing approaches.

10.1109/icstw.2013.11 article EN 2013-03-01

Access control policies are usually specified by the XACML language. However, policy definition could be an error prone process, because of many constraints and rules that have to specified. In order increase confidence on defined policies, accurate testing activity a valid solution. The typical is performed deriving specific test cases, i.e. requests, executed means PDP implementation, so evidence possible security lacks or problems. Thus fault detection effectiveness derived suite...

10.1109/icst.2012.185 article EN 2012-04-01

The trustworthiness of sensitive data needs to be guaranteed and testing is a common activity among privacy protection solutions, even if quite expensive. Accesses resources are ruled by the policy decision point (PDP), which relies on eXtensible Access Control Markup Language (XACML) standard language for specifying access rights. In this study, authors propose strategy automatically deriving test requests from XACML describe their pilot experience in automation using strategy. Considering...

10.1049/iet-sen.2012.0101 article EN IET Software 2013-07-15

The specification of access control policies with the XACML language could be an error prone process, so a testing is usually solution for increasing confidence on policy itself. In this paper, we compare two methodologies deriving test cases testing, i.e. requests, that are implemented in X-CREATE tool. We consider simple combinatorial strategy and XML-based approach (XPT) which exploit values Context Schema. A stopping criterion generation also provided used comparison strategies terms...

10.5220/0003938301550160 article EN cc-by-nc-nd 2012-01-01

Nowadays, more and industrial organizations are using Business Process Model Notation (BPMN) for process modeling. Key performance Indicators (KPIs) seton such models so to get a quantitative assessment of critical success metrics. A timely reliable monitoring KPIs is instrumental (BP) management, several frameworks being proposed purpose. solutions can be embedded into the Modeling (BPM) execution framework or integrated as additional facilities. This paper presents an that allows modeling,...

10.1109/seaa.2015.73 article EN 2015-08-01

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Context</i> : Intelligent monitoring systems can effectively predict or detect anomalies and issues in smart working ecosystems implement the proper countermeasures. However, for their effective efficient use, attributes like responsiveness, performance, quality should be properly tested assessed before integrating system into an ecosystem....

10.1109/access.2024.3376239 article EN cc-by-nc-nd IEEE Access 2024-01-01

Abstract Context: Predicting security and trust vulnerabilities issues is crucial for IoT interconnected systems ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions by using a smart monitoring framework continuously verify functional non-functional property violations during the executions of their Method: This paper presents set guidelines Smart Monitoring Framework definition its application process. Results...

10.1093/jigpal/jzae010 article EN cc-by-nc-nd Logic Journal of IGPL 2024-03-16
Coming Soon ...