skip to main content
Skip header Section
Test and Analysis of Web ServicesNovember 2007
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-540-72911-2
Published:01 November 2007
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Anisetti M, Ardagna C, Damiani E and Saonara F (2013). A test-based security certification scheme for web services, ACM Transactions on the Web, 7:2, (1-41), Online publication date: 1-May-2013.
  2. ACM
    Feugas A, Mosser S and Duchien L A causal model to predict the effect of business process evolution on quality of service Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures, (143-152)
  3. Bianculli D, Ghezzi C, Pautasso C and Senti P Specification patterns from research to industry: a case study in service-based applications Proceedings of the 34th International Conference on Software Engineering, (968-976)
  4. ACM
    Hummer W, Raz O and Dustdar S Towards efficient measuring of web services API coverage Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems, (22-28)
  5. ACM
    Metzger A, Sammodi O, Pohl K and Rzepka M Towards pro-active adaptation with confidence Proceedings of the 2010 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, (20-28)
  6. Bianculli D, Ghezzi C and Pautasso C Embedding continuous lifelong verification in service life cycles Proceedings of the 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems, (99-102)
  7. Kaschner K and Lohmann N Automatic Test Case Generation for Interacting Services Service-Oriented Computing --- ICSOC 2008 Workshops, (66-78)
  8. ACM
    Bianculli D and Ghezzi C Towards a methodology for lifelong validation of service compositions Proceedings of the 2nd international workshop on Systems development in SOA environments, (7-12)
  9. Baazizi M, Sebahi S, Hacid M, Benbernou S and Papazoglou M Monitoring Web Services Proceedings of the 1st European Conference on Towards a Service-Based Internet, (98-109)
  10. Koehler J, Gschwind T, Küster J, Völzer H and Zimmermann O Towards a compiler for business-IT systems Proceedings of the Third IFIP TC 2 Central and East European conference on Software engineering techniques, (1-19)
Contributors
  • Politecnico di Milano
  • Politecnico di Milano

Recommendations

Ghassan Beydoun

The information technology (IT) industry has given the thumbs-up to service-oriented architecture (SOA). Big players, such as IBM, Oracle, and Microsoft, are investing heavily in SOA development tools. What is still missing is a thorough methodology for, and a software engineering approach to, SOA. It remains to be seen whether or not industry support is premature. This book is very timely, and an important step in providing a methodological approach to developing reliable service-based systems. The book covers the analysis, verification, and validation of SOA. The book is a cohesive collection of papers, seamlessly integrated with a very familiar example of using services: John and his wife are organizing and going on a weekend getaway. All contributors of the book use this very accessible and familiar example to illustrate their views on, and solutions to, issues concerning the development of reliable SOA. The early parts of the book are tuned to the early phase of analysis in the software development life cycle (SDLC). The first two chapters focus on the motivation of SOA, underpinning key functional requirements and specifications. Chapters 3 through 5 discuss analysis and model-driven composition. The rest of the book, starting with chapter 6, does not focus on the classical phases of the SDLC; the authors, and editors, intend a focus on validation and verification. These chapters focus on reliability, security, and other related issues. While the book makes a valuable contribution to the software engineering of SOA-based systems, it does not pretend to cover the whole SDLC. The design and implementation of services are not covered, and full SDLC coverage remains unfulfilled. It would have been a refreshing step if the last part of the book addressed the issues of security and reliability from a pure software engineering perspective, aligning it with the modern view that puts security and reliability in the fold of analysis and design. Not to take away from the valuable software engineering contributions of the book, a concluding chapter, critically highlighting the gaps and the areas not covered in the book, would have been valuable, and would have added further cohesion to the text. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.