{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T14:43:36Z","timestamp":1693752216846},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,1,7]],"date-time":"2010-01-07T00:00:00Z","timestamp":1262822400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s11277-009-9879-9","type":"journal-article","created":{"date-parts":[[2010,1,6]],"date-time":"2010-01-06T15:39:36Z","timestamp":1262792376000},"page":"147-172","source":"Crossref","is-referenced-by-count":8,"title":["A Mobile Agent-Based Tool Supporting Web Services Testing"],"prefix":"10.1007","volume":"56","author":[{"given":"Jia","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,7]]},"reference":[{"key":"9879_CR1","doi-asserted-by":"crossref","unstructured":"Elbaum, S., Rothermel, G., Karre, S., & Fisher, M. I. (2005). Leveraging user-session data to support web application testing. IEEE Transactions on Software Engineering, 187\u2013202.","DOI":"10.1109\/TSE.2005.36"},{"key":"9879_CR2","unstructured":"HP. LoadRunner. Accessed June 5, 2009, Available from http:\/\/h10078.www1.hp.com\/cda\/hpms\/display\/main\/hpms_content.jsp?zn=bto&cp=1-11-126-17%5E8_4000_100__ ."},{"issue":"1","key":"9879_CR3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/jwsr.2005010102","volume":"2","author":"C. Werner","year":"2005","unstructured":"Werner C., Buschmann C., Fischer S. (2005) WSDL-driven SOAP compression. International Journal of Web Services Research 2(1): 14\u201335","journal-title":"International Journal of Web Services Research"},{"issue":"1","key":"9879_CR4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1504\/IJWGS.2006.008881","volume":"2","author":"J. Zhang","year":"2005","unstructured":"Zhang J. (2005) A mobile agents-based approach to test reliability of web services. International Journal of Web and Grid Services 2(1): 92\u2013117","journal-title":"International Journal of Web and Grid Services"},{"key":"9879_CR5","doi-asserted-by":"crossref","unstructured":"Rothermel, K., & Popescu-Zeletin, E. R. (1997). Mobile agents. Lecture Notes in Computer Science Series, 1219.","DOI":"10.1007\/3-540-62803-7"},{"issue":"7","key":"9879_CR6","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/35.689628","volume":"36","author":"A. Pham","year":"1998","unstructured":"Pham A., Karmouch A. (1998) Mobile software agents: an overview. IEEE Communications Magazine 36(7): 26\u201337","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"9879_CR7","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/295685.298136","volume":"42","author":"D. B. Lange","year":"1999","unstructured":"Lange D. B., Oshima M. (1999) Seven good reasons for mobile agents. Communications of the ACM 42(3): 88\u201389","journal-title":"Communications of the ACM"},{"key":"9879_CR8","unstructured":"IBM. Aglets. Accessed June 5, 2009, http:\/\/www.trl.ibm.com\/aglets\/ ."},{"key":"9879_CR9","doi-asserted-by":"crossref","unstructured":"Tsai, W. T., Chen, Y., Paul, R., Liao, N., & Huang, H. (2004). Cooperative and group testing in verification of dynamic composite web services. In Proceedings of 28th annual international computer software and applications conference\u2014workshops and fast abstracts\u2014(COMPSAC) (pp. 170\u2013173), September.","DOI":"10.1109\/CMPSAC.2004.1342703"},{"key":"9879_CR10","doi-asserted-by":"crossref","unstructured":"Bai, X., Wang, Y., Dai, G., Tsai, W.-T., & Chen, Y. (2007). A framework for contract-based collaborative verification and validation of web services. In Proceedings of the 10th international ACM SIGSOFT symposium on component-based software engineering (CBSE) (pp. 258\u2013273). Medford, MA, USA, July 9\u201311.","DOI":"10.1007\/978-3-540-73551-9_18"},{"key":"9879_CR11","doi-asserted-by":"crossref","unstructured":"Bai, X., Chen, Y., & Shao, Z. (2007). Adaptive web services testing. In Proceedings of IEEE 31st annual international computer software and applications conference (COMPSAC) (pp. 233\u2013236), July 24\u201327.","DOI":"10.1109\/COMPSAC.2007.53"},{"key":"9879_CR12","unstructured":"Bai, X., Dong, W., Tsai, W.-T., & Chen, Y. (2005). WSDL-based automatic test case generation for web services testing. In Proceedings of IEEE international workshop on service-oriented system engineering (SOSE) (pp. 215\u2013220). Beijing, China, October 20\u201321."},{"key":"9879_CR13","doi-asserted-by":"crossref","unstructured":"Ramsokul, P., Sowmya, A., & Ramesh, S. (2007). A test bed for web services protocols. In Proceedings of second international conference on internet and web applications and services (ICIW) (pp. 16\u201321), May 13\u201319.","DOI":"10.1109\/ICIW.2007.12"},{"issue":"5","key":"9879_CR14","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MIC.2004.27","volume":"8","author":"E. M. Maximilien","year":"2004","unstructured":"Maximilien E. M., Singh M. P. (2004) A framework and ontology for dynamic web services selection. IEEE Internet Computing 8(5): 84\u201393","journal-title":"IEEE Internet Computing"},{"key":"9879_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., & Qiu, R. G. (2006). Fault injection-based test case generation for SOA-oriented software. In Proceedings of IEEE international conference on service operations and logistics, and informatics (SOLI) (pp. 1070\u20131078). Shanghai, China.","DOI":"10.1109\/SOLI.2006.328900"},{"key":"9879_CR16","doi-asserted-by":"crossref","unstructured":"Offutt, J., & Xu, W. (2004). Generating test cases for web services using data perturbation. In Proceedings of workshop on testing, analysis and verification of web services (TAV-WEB), July 1\u201310.","DOI":"10.1145\/1022494.1022529"},{"key":"9879_CR17","doi-asserted-by":"crossref","unstructured":"Arenas, M., Fan, W., & Libkin, L. (2002). What\u2019s hard about XML schema constraints? In Proceedings of international conference on database and expert systems applications (DEXA) (pp. 269\u2013278). Berlin, Heidelberg.","DOI":"10.1007\/3-540-46146-9_27"},{"key":"9879_CR18","unstructured":"Voas, J., & McGraw, G. (1998). Software fault injection: inoculating programs against errors. New York: Wiley. ISBN 0-471-18381-4."},{"key":"9879_CR19","doi-asserted-by":"crossref","unstructured":"Kassab, L., & Voas, J. (1998). Agent trustworthiness. In Proceedings of 4th workshop on mobile object systems: secure internet mobile computations (pp. 121\u2013133). Springer, July 20\u201324.","DOI":"10.21236\/ADA465142"},{"key":"9879_CR20","doi-asserted-by":"crossref","unstructured":"Farmer, W. M., Guttmann, J. D., & Swarup, V. (1996). Security for mobile agents: authentication and state appraisal. In Proceedings of the fourth european symposium on research in computer security (ESORICS) (pp. 118\u2013130), September.","DOI":"10.1007\/3-540-61770-1_31"},{"issue":"5","key":"9879_CR21","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1049\/ecej:20020504","volume":"14","author":"N. Borselius","year":"2002","unstructured":"Borselius N. (2002) Mobile agent security. Electronics & Communication Engineering Journal 14(5): 211\u2013218","journal-title":"Electronics & Communication Engineering Journal"},{"key":"9879_CR22","unstructured":"Vigna, G. (Ed.) (1999). Mobile agents and security. (Lecture Notes in Computer Science). Berlin: Springer-Verlag, Telos."},{"key":"9879_CR23","unstructured":"Aouadi, H., & Ahmed, M. B. (2005). Mobile agents security. In Proceedings of IEEE 2nd international conference on mobile technology, applications and systems (p. 6), November 15\u201317."},{"issue":"1","key":"9879_CR24","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/643477.643479","volume":"3","author":"J. Claessens","year":"2003","unstructured":"Claessens J., Preneel B., Vandewalle J. (2003) (How) can mobile agents do secure electronic transactions on untrusted hosts? a survey of the security issues and the current solutions. ACM Transactions on Internet Technology (TOIT) 3(1): 28\u201348","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"9879_CR25","unstructured":"Ge, H., & Tate, S. R. (2006). Efficient authenticated key-exchange for devices with a trusted manager. In Proceedings of the third international conference on information technology: new generations (ITNG\u201906) (pp. 198\u2013203), April 10\u201312."},{"key":"9879_CR26","doi-asserted-by":"crossref","unstructured":"Young, A., & Yung, M. (1997). Sliding encryption: a cryptographic tool for mobile agents. In Proceedings of the 4th international workshop on fast software encryption (FSE\u201997) (pp. 230\u2013241), January 20\u201322.","DOI":"10.1007\/BFb0052350"},{"key":"9879_CR27","unstructured":"Kim, H., Baek, J., Lee, B., & Kim, K. (2001). Secret computation with secrets for mobile agent using one-time proxy signature. In Proceedings of the 2001 symposium on cryptography and information security (pp. 845\u2013850)."},{"key":"9879_CR28","unstructured":"Sun. NetBeans. Accessed on June 5, 2009, http:\/\/www.netbeans.org\/ ."},{"key":"9879_CR29","unstructured":"Sun. Java remote method invocation, Accessed on June 5, 2009, http:\/\/java.sun.com\/javase\/technologies\/core\/basic\/rmi\/index.jsp ."},{"key":"9879_CR30","unstructured":"WSDL. Web services description language. Accessed on June 5, 2009, http:\/\/www.w3.org\/TR\/wsdl ."},{"key":"9879_CR31","unstructured":"Biron, P. V., & Malhotra, A. (2001). W3C recommendation XML schema part 2: datatypes, Accessed on June 5, 2009, http:\/\/www.w3.org\/TR\/2001\/REC-xmlschema-2-20010502 ."},{"issue":"13","key":"9879_CR32","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1002\/spe.547","volume":"33","author":"J. Zhang","year":"2003","unstructured":"Zhang J., Chung J.-Y. (2003) Mockup-driven fast-prototyping methodology for web application development. Software Practice & Experience Journal 33(13): 1251\u20131272","journal-title":"Software Practice & Experience Journal"},{"key":"9879_CR33","unstructured":"Sun. J2EE. Accessed on June 5, 2009, http:\/\/java.sun.com\/javaee\/ ."},{"key":"9879_CR34","unstructured":"Sun. Sun java system application server. Accessed on June 5, 2009, http:\/\/www.sun.com\/software\/products\/appsrvr\/previous\/pe8\/index.xml ."},{"key":"9879_CR35","unstructured":"Sun. Java web service development pack (JWSDP). Accessed on June 5, 2009, http:\/\/jwsdp.dev.java.net\/index.html ."},{"key":"9879_CR36","unstructured":"Sun. JAX-RPC. Accessed on June 5, 2009, http:\/\/jax-rpc.dev.java.net\/ ."},{"key":"9879_CR37","unstructured":"Sun. JAX-WS. Accessed on June 5, 2009, http:\/\/jax-ws.dev.java.net\/ ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9879-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-009-9879-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9879-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:05:21Z","timestamp":1559394321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-009-9879-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,7]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["9879"],"URL":"https:\/\/doi.org\/10.1007\/s11277-009-9879-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,7]]}}}