{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T08:10:14Z","timestamp":1773130214074,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,10]],"date-time":"2013-08-10T00:00:00Z","timestamp":1376092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s11761-013-0139-1","type":"journal-article","created":{"date-parts":[[2013,8,9]],"date-time":"2013-08-09T02:29:09Z","timestamp":1376015349000},"page":"1-13","source":"Crossref","is-referenced-by-count":17,"title":["A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation"],"prefix":"10.1007","volume":"8","author":[{"given":"Jinfu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chengying","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Dave","family":"Towey","sequence":"additional","affiliation":[]},{"given":"Yongzhao","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Huanhuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,10]]},"reference":[{"key":"139_CR1","unstructured":"Samer H, Malcolm M (2007) An approach for specification-based test case generation for Web services. In: Proceeding of computer systems and applications, IEEE\/ACS international conference, pp 16\u201323"},{"key":"139_CR2","unstructured":"Shaban MJ, Gillian D, Jing S (2009) Towards specification based testing for semantic Web services. In: Proceeding of 2009 Australian software engineering conference, pp 54\u201363"},{"key":"139_CR3","unstructured":"Bloomberg J (2002) Testing web services today and tomorrow. Ration Edge E-zine for the Rational Community"},{"issue":"4","key":"139_CR4","first-page":"568","volume":"28","author":"Y Jiang","year":"2005","unstructured":"Jiang Y, Xin GM, Shan JH et al (2005) A method of automated test data generation for web service. J Comput 28(4):568\u2013577","journal-title":"J Comput"},{"key":"139_CR5","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1016\/j.ins.2010.09.030","volume":"181","author":"ACV Melo de","year":"2011","unstructured":"de Melo ACV, Silveira P (2011) Improving data perturbation testing techniques for web services. Inform Sci 181:600\u2013619","journal-title":"Inform Sci"},{"issue":"5","key":"139_CR6","first-page":"1","volume":"29","author":"J Offutt","year":"2004","unstructured":"Offutt J, Xu W (2004) Generating test cases for web services using data perturbation. ACM SIGSOFT Softw Eng Notes 29(5):1\u201310","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"139_CR7","unstructured":"Xu W, Offutt J, Luo J (2005) Testing web services by XML perturbation. In: Proceedings of the 16th IEEE international symposium on software reliability engineering (ISSRE\u201905), pp 257\u2013266"},{"key":"139_CR8","doi-asserted-by":"crossref","unstructured":"LF Junior de Almeida, SR Vergilio (2006) Exploring perturbation based testing for Web services. In: Proceedings of the IEEE international conference on web services (ICWS\u201906), IEEE Computer Society. Washington, DC, USA pp 717\u2013726","DOI":"10.1109\/ICWS.2006.60"},{"key":"139_CR9","doi-asserted-by":"crossref","unstructured":"Watkins KZ (2010) Introducing fault-based combinatorial testing to Web services. In: Proceeding of the IEEE SoutheastCon (SoutheastCon), pp 131\u2013134","DOI":"10.1109\/SECON.2010.5453905"},{"key":"139_CR10","volume-title":"Software testing: a Craftsman\u2019s approach","author":"PC Jorgensen","year":"2008","unstructured":"Jorgensen PC (2008) Software testing: a Craftsman\u2019s approach. Taylor & Francis Group, UK"},{"key":"139_CR11","volume-title":"Web services: principles and technology","author":"MP Papazoglou","year":"2012","unstructured":"Papazoglou MP (2012) Web services: principles and technology. Pearson Education Canada, Upper Saddle River"},{"key":"139_CR12","doi-asserted-by":"crossref","unstructured":"Tsai WT, Paul R, Wang Y et a1 (2002) Extending WSDL to facilitate Web services testing. In: Proceedings of the 7th IEEE international symposium on high assurance systems engineering, pp 171\u2013172","DOI":"10.1109\/HASE.2002.1173119"},{"key":"139_CR13","doi-asserted-by":"crossref","unstructured":"Martin E, Basu S, Xie T (2007) Automated testing and response analysis of Web services. In: Proceedings of 2007 IEEE international conference on Web services (ICWS 2007), IEEE Computer Society, pp 647\u2013654","DOI":"10.1109\/ICWS.2007.49"},{"key":"139_CR14","unstructured":"Sneed HM, Huan S (2006) WSDLTest-A tool for testing Web services. In: Proceedings of eighth IEEE international symposium Web site evolution, IEEE Computer Society, pp 14\u201321"},{"key":"139_CR15","unstructured":"Bai X, Dong W, Tsai WT et al (2005) WSDL-based automatic test case generation for Web services testing. In: Proceeding of the 2005 IEEE international workshop on service-oriented system engineering (SOSE\u201905), pp 207\u2013212"},{"key":"139_CR16","doi-asserted-by":"crossref","unstructured":"Hanna S, Munro M (2007) An approach for specification-based test case generation for Web services. In: Proceeding of IEEE\/ACS international conference on computer systems and applications. Wasington, pp 16\u201323","DOI":"10.1109\/AICCSA.2007.370859"},{"issue":"7","key":"139_CR17","first-page":"1127","volume":"46","author":"C Jinfu","year":"2009","unstructured":"Jinfu C, Yansheng L, Xiaodong X (2009) A fault injection model of component security testing. J Comput Res Dev 46(7):1127\u20131135","journal-title":"J Comput Res Dev"},{"issue":"3","key":"139_CR18","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.sysarc.2010.03.002","volume":"57","author":"HC Kim","year":"2011","unstructured":"Kim HC, Choi YH, Lee DH (2011) Efficient file fuzz testing using automated analysis of binary file format. J Syst Archit 57(3):259\u2013268","journal-title":"J Syst Archit"},{"key":"139_CR19","volume-title":"Fuzz revisited: a re-examination of the reliability of UNIX utilities and services","author":"BP Miller","year":"2000","unstructured":"Miller BP, Koski D, Lee CP, Maganty V, Murthy R, Natarajan A, Steidl J (2000) Fuzz revisited: a re-examination of the reliability of UNIX utilities and services, vol 1. Computer Sciences Department, University of Wisconsin, Wisconsin"},{"key":"139_CR20","unstructured":"Sofia B, Chaouki B, Roland G, Laurent M (2011) Finding software vulnerabilities by smart fuzzing. In: Proceeding of the fourth IEEE international conference on software testing, verification and validation, pp 427\u2013430"},{"key":"139_CR21","doi-asserted-by":"crossref","unstructured":"YH Choi, HC Kim, Lee DH (2007) Tag-aware text file fuzz testing for security of a software system. In: Proceedings of the convergence information technology, IEEE computer society, pp 2254\u201322","DOI":"10.1109\/ICCIT.2007.45"},{"key":"139_CR22","doi-asserted-by":"crossref","unstructured":"Bekrar S, Bekrar C, Groz R et al (2011) Finding software vulnerabilities by smart fuzzing. In The fourth IEEE international conference on software testing, verification and validation, Wasington, pp 427\u2013430","DOI":"10.1109\/ICST.2011.48"},{"key":"139_CR23","unstructured":"SoapUI (2012) SmartBear Software. Available at http:\/\/www.soapui.org (last access Sept 2012)"},{"key":"139_CR24","unstructured":"WS-Security (2010) OASIS. Available at http:\/\/www.oasis-open.org\/specs (last access May 2010)"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0139-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-013-0139-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0139-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T14:01:41Z","timestamp":1563631301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-013-0139-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,10]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s11761-013-0139-1","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,10]]}}}