Skip to main content

A Model-Based Testing Approach Combining Passive Conformance Testing and Runtime Verification: Application to Web Service Compositions Deployed in Clouds

  • Conference paper
Software Engineering Research, Management and Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 496))

Abstract

This paper proposes a model-based testing approach which combines two monitoring methods, runtime verification and passive testing. Starting from ioSTS (input output Symbolic Transition System) models, this approach generates monitors to check whether an implementation is conforming to its specification and meets safety properties. This paper also tackles the trace extraction problem by reusing the notion of proxy to collect traces from environments whose access rights are restricted. Instead of using a classical proxy to collect traces, we propose to generate a formal model from the specification, called Proxy-monitor, which acts as a proxy and which can directly detect implementation errors. We apply and specialise this approach on Web service compositions deployed in PaaS environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ws-bpel, Oasis Consortium (2007), http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html

  2. Andrés, C., Cambronero, M.E., Núñez, M.: Passive testing of web services. In: Bravetti, M. (ed.) WS-FM 2010. LNCS, vol. 6551, pp. 56–70. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Arthoa, C., Barringerb, H., Goldbergc, A., Havelundc, K., Khurshidd, S., Lowrye, M., Pasareanuf, C., Rosug, G., Seng, K., Visserh, W., Washingtonh, R.: Combining test case generation and runtime verification. Theoretical Computer Science 336(2-3), 209–234 (2005)

    Article  MathSciNet  Google Scholar 

  4. Barringer, H., Gabbay, D., Rydeheard, D.: From runtime verification to evolvable systems. In: Sokolsky, O., Taşıran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 97–110. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Cavalli, A., Benameur, A., Mallouli, W., Li, K.: A Passive Testing Approach for Security Checking and its Practical Usage for Web Services Monitoring. In: NOTERE 2009 (2009)

    Google Scholar 

  6. Constant, C., Jéron, T., Marchand, H., Rusu, V.: Integrating formal verification and conformance testing for reactive systems. IEEE Trans. Softw. Eng. 33(8), 558–574 (2007), doi:10.1109/TSE.2007.70707

    Article  Google Scholar 

  7. d’Amorim, M., Havelund, K.: Event-based runtime verification of java programs. In: Proceedings of the Third International Workshop on Dynamic Analysis, WODA 2005, pp. 1–7. ACM, New York (2005), doi:10.1145/1082983.1083249

    Chapter  Google Scholar 

  8. Falcone, Y., Jaber, M., Nguyen, T.-H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems. In: Barthe, G., Pardo, A., Schneider, G. (eds.) SEFM 2011. LNCS, vol. 7041, pp. 204–220. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Frantzen, L., Tretmans, J., Willemse, T.A.C.: Test Generation Based on Symbolic Specifications. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 1–15. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Jéron, T., Marchand, H., Rusu, V.: Symbolic determinisation of extended automata. In: Navarro, G., Bertossi, L., Kohayakawa, Y. (eds.) TCS 2006. IFIP, vol. 209, pp. 197–212. Springer, Boston (2006)

    Google Scholar 

  11. Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring: a formal approach with passive testing. IEEE/ACM Trans. Netw. 14, 424–437 (2006)

    Article  Google Scholar 

  12. Nguyen, H.N., Poizat, P., Zaidi, F.: Online verification of value-passing choreographies through property-oriented passive testing. In: Ninth IEEE International Symposium on High-Assurance Systems Engineering, pp. 106–113 (2012)

    Google Scholar 

  13. Salva, S.: Passive testing with proxy-testers. International Journal of Software Engineering and Its Applications (IJSEIA). Science & Engineering Research Support Society (SERSC) 5 (2011)

    Google Scholar 

  14. Salva, S.: A model-based testing approach combining passive testing and runtime verification. Tech. rep., LIMOS, LIMOS Research report RR13-04 (2013), http://sebastien.salva.free.fr/useruploads/files/RR-13-04.pdf

  15. Tretmans, J.: Test generation with inputs, outputs and repetitive quiescence. Software - Concepts and Tools 17(3), 103–120 (1996)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sébastien Salva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Salva, S., Cao, TD. (2014). A Model-Based Testing Approach Combining Passive Conformance Testing and Runtime Verification: Application to Web Service Compositions Deployed in Clouds. In: Lee, R. (eds) Software Engineering Research, Management and Applications. Studies in Computational Intelligence, vol 496. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00948-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00948-3_7

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-00947-6

  • Online ISBN: 978-3-319-00948-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics