{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:55:07Z","timestamp":1773222907767,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T00:00:00Z","timestamp":1534204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["654182"],"award-info":[{"award-number":["654182"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10723-018-9454-2","type":"journal-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:53:36Z","timestamp":1534200816000},"page":"683-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["umd-verification: Automation of Software Validation for the EGI Federated e-Infrastructure"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2473-6405","authenticated-orcid":false,"given":"Pablo","family":"Orviz Fern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Pina","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"L\u00f3pez Garc\u00eda","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Campos Plasencia","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio","family":"David","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"key":"9454_CR1","unstructured":"EGI.eu: EGI Federation. https:\/\/www.egi.eu (2018). Online; Accessed 1 Apr 2018"},{"issue":"2","key":"9454_CR2","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10723-011-9187-y","volume":"9","author":"G Andronico","year":"2011","unstructured":"Andronico, G., et al.: E-infrastructures for e-science: A global view. J. Grid Comput. 9(2), 155\u2013184 (2011)","journal-title":"J. Grid Comput."},{"issue":"2","key":"9454_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10723-013-9255-6","volume":"11","author":"J Shamsi","year":"2013","unstructured":"Shamsi, J., et al.: Data-intensive cloud computing: Requirements, expectations, challenges, and solutions. J. Grid Comput. 11(2), 281\u2013310 (2013)","journal-title":"J. Grid Comput."},{"issue":"3","key":"9454_CR4","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10723-012-9225-4","volume":"10","author":"MS P\u00e9rez","year":"2012","unstructured":"P\u00e9rez, M.S., Montes, J., S\u00e1nchez A.: Riding out the storm: How to deal with the complexity of grid and cloud management. J. Grid Comput. 10(3), 349\u2013366 (2012)","journal-title":"J. Grid Comput."},{"issue":"3","key":"9454_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s10723-014-9301-z","volume":"12","author":"M David","year":"2014","unstructured":"David, M., et al.: Validation of grid middleware for the european grid infrastructure. J. Grid Comput. 12(3), 543\u2013558 (2014)","journal-title":"J. Grid Comput."},{"key":"9454_CR6","unstructured":"EGI Quality Assurance team: EGI Quality Criteria 7th release. http:\/\/egi-qc.github.io\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR7","unstructured":"Peter, S.: AppImage. https:\/\/appimage.org\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR8","unstructured":"Ubuntu: Ubuntu Snap. https:\/\/www.ubuntu.com\/desktop\/snappy (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR9","unstructured":"FlatPak: FlatPak. https:\/\/flatpak.org\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR10","unstructured":"Debian: Debian Policy Manual. https:\/\/www.debian.org\/doc\/debian-policy\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR11","unstructured":"Debian: Debian Quality Assurance. https:\/\/piuparts.debian.org\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR12","unstructured":"IEEE Computer Society: Ieee standard for system and software verification and validation. IEEE Std 1012-2012 (Revision of IEEE Std 1012-2004), pp. 1\u2013223 (2012)"},{"key":"9454_CR13","doi-asserted-by":"crossref","unstructured":"Ryan, M.J., Wheatcraft, L.S.: On the use of the terms verification and validation. In: INCOSE International Symposium, vol. 27, 1, pp. 1277\u20131290. Wiley Online Library (2017)","DOI":"10.1002\/j.2334-5837.2017.00427.x"},{"key":"9454_CR14","unstructured":"CMMI Product Team: Cmmi for development, version 1.3. Technical Report CMU\/SEI-2010-TR-033, Software Engineering Institute, Carnegie Mellon University, Pittsburgh PA (2010)"},{"key":"9454_CR15","unstructured":"CMMI Product Team: Cmmi for services, version 1.3. Technical Report CMU\/SEI-2010-TR-034, Software Engineering Institute, Carnegie Mellon University, Pittsburgh PA (2010)"},{"key":"9454_CR16","unstructured":"CMMI Product Team: Cmmi for acquisition, version 1.3. Technical Report CMU\/SEI-2010-TR-032, Software Engineering Institute, Carnegie Mellon University, Pittsburgh PA (2010)"},{"key":"9454_CR17","doi-asserted-by":"crossref","unstructured":"Monteiro, P., Machado, R. J., Kazman, R.: Inception of software validation and verification practices within cmmi level 2. In: 2009 Fourth International Conference on Software Engineering Advances, pp. 536\u2013541 (2009)","DOI":"10.1109\/ICSEA.2009.84"},{"issue":"11","key":"9454_CR18","first-page":"19","volume":"16","author":"A German","year":"2003","unstructured":"German, A.: Software static code analysis lessons learned. Crosstalk 16(11), 19\u201322 (2003)","journal-title":"Crosstalk"},{"key":"9454_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/9781119202486","volume-title":"The Art of Software Testing","author":"TBGJ Myers","year":"2012","unstructured":"Myers, T.B.G.J., Sandler, C.: The Art of Software Testing. Wiley, Hoboken (2012)"},{"key":"9454_CR20","unstructured":"Perry, W.E.: Effective Methods for Software Testing: Includes Complete Guidelines, Checklists, and Templates. Wiley (2007)"},{"key":"9454_CR21","unstructured":"Kit, E.: Software Testing in the Real World: Improving the Process. Addison-wesley (1995)"},{"issue":"4","key":"9454_CR22","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/TR.2005.859230","volume":"54","author":"C-Y Huang","year":"2005","unstructured":"Huang, C.-Y., Lyu, M.R.: Optimal release time for software systems considering cost, testing-effort, and test efficiency. IEEE Trans. Reliab. 54(4), 583\u2013591 (2005)","journal-title":"IEEE Trans. Reliab."},{"key":"9454_CR23","first-page":"56","volume":"2","author":"J Bullock","year":"2000","unstructured":"Bullock, J.: Calculating the value of testing from an executive\u2019s perspective, software testing is not a capital investment in the physical plant, an acquisition, or another readily accepted business expense. A quality assurance manager describes how to present testing as a business-process investment. Softw. Test. Quality Eng. 2, 56\u201363 (2000)","journal-title":"Softw. Test. Quality Eng."},{"key":"9454_CR24","doi-asserted-by":"crossref","unstructured":"Saglietti, F., Pinte, F.: Automated unit and integration testing for component-based software systems. In: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, p. 5. ACM (2010)","DOI":"10.1145\/1868433.1868440"},{"key":"9454_CR25","unstructured":"Dustin, E., Rashka, J., Paul, J.: Automated Software Testing: Introduction, Management, and Performance. Addison-Wesley Professional (1999)"},{"key":"9454_CR26","doi-asserted-by":"crossref","unstructured":"Rafi, D.M., Moses, K.R.K., Petersen, K., M\u00e4ntyl\u00e4, M.V.: Benefits and limitations of automated software testing: Systematic literature review and practitioner survey. In: Proceedings of the 7th International Workshop on Automation of Software Test, pp. 36\u201342. IEEE Press (2012)","DOI":"10.1109\/IWAST.2012.6228988"},{"issue":"8","key":"9454_CR27","doi-asserted-by":"publisher","first-page":"e1639","DOI":"10.1002\/stvr.1639","volume":"27","author":"Kristian Wiklund","year":"2017","unstructured":"Wiklund, K., Eldh, S., Sundmark, D., Lundqvist, K.: Impediments for software test automation: A systematic literature review. Softw. Test. Verif. Reliab. 27(8) (2017)","journal-title":"Software Testing, Verification and Reliability"},{"issue":"2","key":"9454_CR28","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s13198-011-0065-6","volume":"2","author":"O Taipale","year":"2011","unstructured":"Taipale, O., Kasurinen, J., Karhu, K., Smolander, K.: Trade-off between automated and manual software testing. Int. J. Syst. Assur. Eng. Manag. 2(2), 114\u2013125 (2011)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"9454_CR29","unstructured":"Ansible: Ansible. https:\/\/www.ansible.com\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR30","unstructured":"Puppet: Puppet. https:\/\/puppet.com\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR31","unstructured":"EGI Software Provisioning team: umd-verification tool. https:\/\/github.com\/egi-qc\/umd-verification (2018). Online; Accessed 1 April 2018"},{"key":"9454_CR32","unstructured":"The Python Community: The Python language. https:\/\/www.python.org\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR33","unstructured":"Forcier, J.: Fabric - Pythonic remote execution. http:\/\/www.fabfile.org\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR34","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. RFC 5280, RFC Editor (2008). http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt"},{"key":"9454_CR35","unstructured":"National Institute of Standards and Technology (NIST): Secure hash standard. Federal Inf. Process. Stds. (NIST FIPS), pp. 180\u2013184 (2015)"},{"key":"9454_CR36","unstructured":"Open Grid Forum: GLUE Specification v. 2. https:\/\/www.ogf.org\/documents\/GFD.147.pdf (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR37","unstructured":"CERN: GLUE validator guide. http:\/\/gridinfo.web.cern.ch\/glue\/glue-validator-guide (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR38","unstructured":"Jenkins: EGI Jenkins CI. https:\/\/jenkins.egi.ifca.es\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR39","unstructured":"EGI.eu: EGI Document Server. https:\/\/documents.egi.eu\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR40","unstructured":"EGI Software Provisioning team: EGI Quality Criteria in GitHub. https:\/\/github.com\/egi-qc (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR41","unstructured":"EGI Software Provisioning team: EGI Quality Criteria in Ansible Galaxy. https:\/\/galaxy.ansible.com\/egi-qc\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR42","unstructured":"EGI Software Provisioning team: EGI Quality Criteria in PuppetForge. https:\/\/forge.puppet.com\/egiqc\/ (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR43","unstructured":"Sim\u00f3n, \u00c1.: EGI Release candidate tester. https:\/\/github.com\/alvarosimon\/RC_tester (2018). Online; Accessed 1 Apr 2018"},{"key":"9454_CR44","unstructured":"EGI Software Provisioning team: EGI Release candidate Ansible role. https:\/\/github.com\/egi-qc\/ansible-release-candidate (2018). Online; Accessed 1 Apr 2018"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-018-9454-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-018-9454-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-018-9454-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T09:51:16Z","timestamp":1751795476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-018-9454-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,14]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9454"],"URL":"https:\/\/doi.org\/10.1007\/s10723-018-9454-2","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,14]]},"assertion":[{"value":"12 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}