Web application testing: A systematic literature review

S Doğan, A Betin-Can, V Garousi - Journal of Systems and Software, 2014 - Elsevier
Context The web has had a significant impact on all aspects of our society. As our society
relies more and more on the web, the dependability of web applications has become …

A systematic mapping study of web application testing

V Garousi, A Mesbah, A Betin-Can… - Information and Software …, 2013 - Elsevier
CONTEXT: The Web has had a significant impact on all aspects of our society. As our
society relies more and more on the Web, the dependability of web applications has become …

A discrete and bounded envy-free cake cutting protocol for any number of agents

H Aziz, S Mackenzie - 2016 IEEE 57th Annual Symposium on …, 2016 - ieeexplore.ieee.org
We consider the well-studied cake cutting problem in which the goal is to find an envy-free
allocation based on queries from n agents. The problem has received attention in computer …

Flapjax: a programming language for Ajax applications

LA Meyerovich, A Guha, J Baskin, GH Cooper… - Proceedings of the 24th …, 2009 - dl.acm.org
This paper presents Flapjax, a language designed for contemporary Web applications.
These applications communicate with servers and have rich, interactive interfaces. Flapjax …

Using static analysis for Ajax intrusion detection

A Guha, S Krishnamurthi, T Jim - … of the 18th international conference on …, 2009 - dl.acm.org
We present a static control-flow analysis for JavaScript programs running in a web browser.
Our analysis tackles numerous challenges posed by modern web applications including …

Specification and verification of data-driven web applications

A Deutsch, L Sui, V Vianu - Journal of Computer and System Sciences, 2007 - Elsevier
We study data-driven Web applications provided by Web sites interacting with users or
applications. The Web site can access an underlying database, as well as state information …

Finding security bugs in web applications using a catalog of access control patterns

JP Near, D Jackson - Proceedings of the 38th International Conference …, 2016 - dl.acm.org
We propose a specification-free technique for finding missing security checks in web
applications using a catalog of access control patterns in which each pattern models a …

Modelling methods for web application verification and testing: state of the art

MH Alalfi, JR Cordy, TR Dean - Software Testing, Verification …, 2009 - Wiley Online Library
Abstract Models are considered an essential step in capturing different system behaviours
and simplifying the analysis required to check or improve the quality of software. Verification …

Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines

S Hallé, T Ettema, C Bunch, T Bultan - Proceedings of the 25th IEEE …, 2010 - dl.acm.org
The enforcement of navigation constraints in web applications is challenging and error
prone due to the unrestricted use of navigation functions in web browsers. This often leads …

Modeling and verification of adaptive navigation in web applications

M Han, C Hofmeister - Proceedings of the 6th international conference …, 2006 - dl.acm.org
The navigation of a web application is the possible sequences of web pages a user can visit.
In the simplest case the next page is determined by the current page and the action (eg link …