{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:06:40Z","timestamp":1748491600836,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319198897"},{"type":"electronic","value":"9783319198903"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19890-3_5","type":"book-chapter","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T05:31:58Z","timestamp":1434000718000},"page":"52-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Inter-Component Control Flow in Web Applications"],"prefix":"10.1007","author":[{"given":"William G. J.","family":"Halfond","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,10]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10270-004-0077-7","volume":"4","author":"AA Andrews","year":"2005","unstructured":"Andrews, A.A., Offutt, J., Alexander, R.T.: Testing Web Applications by Modeling with FSMs. Software Systems and Modeling 4(3), 326\u2013345 (2005)","journal-title":"Software Systems and Modeling"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Balzarotti, D., Cova, M., Felmetsger, V.V., Vigna, G.: Multi-module vulnerability analysis of web-based applications. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 25\u201335. ACM, New York (2007)","DOI":"10.1145\/1315245.1315250"},{"key":"5_CR3","unstructured":"Benedikt, M., Freire, J., Godefroid, P.: VeriWeb: automatically testing dynamic web sites. In: Proceedings the International World Wide Web Conference. ACM Press, New York, May 2002"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44898-5_1","volume-title":"Static Analysis","author":"AS Christensen","year":"2003","unstructured":"Christensen, A.S., M\u00f8ller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 1\u201318. Springer, Heidelberg (2003)"},{"issue":"5","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1022494.1022528","volume":"29","author":"Y Deng","year":"2004","unstructured":"Deng, Y., Frankl, P., Wang, J.: Testing Web Database Applications. SIGSOFT Software Engineering Notes 29(5), 1\u201310 (2004)","journal-title":"SIGSOFT Software Engineering Notes"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TSE.2007.70742","volume":"34","author":"L Desmet","year":"2008","unstructured":"Desmet, L., Verbaeten, P., Joosen, W., Piessens, F.: Provable protection against web application vulnerabilities related to session data dependencies. IEEE Transactions on Software Engineering 34(1), 50\u201364 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TSE.2005.36","volume":"31","author":"S Elbaum","year":"2005","unstructured":"Elbaum, S., Rothermel, G., Karre II, S.: Leveraging User-Session Data to Support Web Application Testing. Transactions On. Software Engineering 31(3), 187\u2013202 (2005)","journal-title":"Software Engineering"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J.: Automated checking of web application invocations. In: Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 111\u2013120. IEEE, New York (2012)","DOI":"10.1109\/ISSRE.2012.37"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Halfond, W.G., Orso, A.: Automated identification of parameter mismatches in web applications. In: Proceedings of the Symposium on the Foundations of Software Engineering, pp. 181\u2013191. ACM, New York (2008)","DOI":"10.1145\/1453101.1453126"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hall\u00e9, S., Ettema, T., Bunch, C., Bultan, T.: Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE 2010, pp. 235\u2013244. ACM, New York (2010)","DOI":"10.1145\/1858996.1859044"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Han, M., Hofmeister, C.: Modeling and verification of adaptive navigation in web applications. In: Proceedings of the 6th International Conference on Web Engineering, ICWE 2006, pp. 329\u2013336. ACM, New York (2006)","DOI":"10.1145\/1145581.1145645"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-75209-7_24","volume-title":"Model Driven Engineering Languages and Systems","author":"M Han","year":"2007","unstructured":"Han, M., Hofmeister, C.: Relating navigation and request routing models in web applications. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol. 4735, pp. 346\u2013359. Springer, Heidelberg (2007)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Haydar, M.: Formal framework for automated analysis and verification of web-based applications. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering, pp. 410\u2013413. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/ASE.2004.1342778"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Huang, Y., Huang, S., Lin, T., Tsai, C.: Web application security assessment by fault injection and behavior monitoring. In: Proceedings of the International World Wide Web Conference, pp. 148\u2013159. ACM, New York (2003)","DOI":"10.1145\/775152.775174"},{"key":"5_CR15","unstructured":"Jia, X., Liu, H.: Rigorous and automatic testing of web applications. In: Proceedings of the International Conference on Software Engineering and Applications, pp. 280\u2013285. ACTA Press, Cambridge, MA (2002)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Licata, D., Krishnamurthi, S.: Verifying interactive web programs. In: Proceedings of the International Conference on Automated Software Engineering, pp. 164\u2013173. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/ASE.2004.1342734"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Mesbah, A., Bozdag, E., van Deursen, A.: Crawling ajax by inferring user interface state changes. In: Schwabe, D., Curbera, F., Dantzig, P. (eds.) Proceedings of the International Conference on Web Engineering, pp. 122\u2013134. IEEE Computer Society, Washington, DC (2008)","DOI":"10.1109\/ICWE.2008.24"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Mesbah, A., van Deursen, A.: Invariant-based automatic testing of ajax user interfaces. In: Proceedings of the 31st International Conference on Software Engineering (ICSE 2009). Research Papers, pp. 210\u2013220. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/ICSE.2009.5070522"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Minamide, Y.: Static approximation of dynamically generated web pages. In: Proceedings of the International World Wide Web Conference, pp. 432\u2013441. ACM Press, New York (2005)","DOI":"10.1145\/1060745.1060809"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Ricca, F., Tonella, P.: Analysis and testing of web applications. In: Proceedings of the International Conference on Software Engineering, pp. 25\u201334. IEEE, Washington, DC (2001)","DOI":"10.1109\/ICSE.2001.919078"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Ricca, F., Tonella, P.: Web application slicing. In: Proceedings of the International Conference on Software Maintenance, pp. 148\u2013157. IEEE Computer Society, Los Alamitos (2001)","DOI":"10.1109\/ICSM.2001.972725"},{"key":"5_CR22","unstructured":"Sun, F., Xu, L., Su, Z.: Static detection of access control vulnerabilities in web applications. In: Proceedings of the USENIX Security Symposium, p. 1. USENIX Association, Berkeley (2011)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Tonella, P., Ricca, F.: Dynamic model extraction and statistical analysis of web applications. In: Proceedings of the Fourth International Workshop on Web Site Evolution, pp. 43\u201352. IEEE, Washington, DC (2002)","DOI":"10.1109\/WSE.2002.1134088"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Tonella, P., Ricca, F.: A 2-Layer model for the white-box testing of web applications. In: Proceedings of the International Workshop Web Site Evolution, pp. 11\u201319. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/WSE.2004.10012"},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10515-005-6208-8","volume":"12","author":"P Tonella","year":"2005","unstructured":"Tonella, P., Ricca, F.: Web Application Slicing in Presence of Dynamic Code Generation. Automated Software Engineering 12(2), 259\u2013288 (2005)","journal-title":"Automated Software Engineering"},{"key":"5_CR26","unstructured":"Yang, J., Huang, J., Wang, F., Chu, W.: Constructing control-flow-based testing tools for web application. In: Proc. of the 11th Software Enginnering and Knowledge Enginnering Conference (SEKE), p. 1. World Scientific Publishing, Singapore (1999)"}],"container-title":["Lecture Notes in Computer Science","Engineering the Web in the Big Data Era"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19890-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T14:02:45Z","timestamp":1748440965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19890-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319198897","9783319198903"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19890-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"10 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}