Computer Science ›› 2018, Vol. 45 ›› Issue (4): 203-207.doi: 10.11896/j.issn.1002-137X.2018.04.034

Previous Articles     Next Articles

Study on Construction of EFSM Model for Web Application Based on Session

GUO Jun-xia, GUO Ren-fei, XU Nan-shan and ZHAO Rui-lian   

  • Online:2018-04-15 Published:2018-05-11

Abstract: In the research field of Web application model,the main research object is the applications which don’t include Ajax.A small number of models which consider the specialty of Ajax use the traditional FSM,and can’t describe the parameter transfer problems after the message is triggered in client.There is a method in which the UML layered models is introduced into the FSM for Ajax.However,this method needs manual intervention.It is not convenient for the automatic generation of the test case.To address the above problems,this paper presented an approach which builds model for Web applications based on EFSM as an important software description model.This approach firstly analyzes users’ behaviors from users-session data which are recorded in server-side.Meanwhile,the client side events will be recorded.Then,the users’ behaviors with client-side events are matched to generate the complete user session data,from which the EFSM model can be built for the Web application.The experiments show that the EFSM model built by using the proposed approach can represent the state and its changes of Web applications effectively.The EFSM model is also convenient for generating test cases automatically.

Key words: Web application,User session data,Ajax,EFSM model

[1] LI L,MIAO H,CHEN S.Test Generation for Web Applications Using Model-Checking[C]∥Acis International Conference on Software Engineering,Artificial Intelligence,NETWORKING and Parallel/distributed Computing.IEEE Computer Society,2010:237-242.
[2] LEBEAU F,LEGEARD B,PEUREUX F,et al.Model-basedvulnerability testing for Web applications[C]∥6th Internatio-nal Conference on Software Testing,Verification and Validation Workshops(ICSTW).IEEE 2013,2013:18-22.
[3] MIAO H K,CHEN S B,ZENG H W.Model-based Web application testing [J].Chinese Journal of Computers,2011,4(6):1012-1028.(in Chinese) 缪淮扣,陈圣波,曾红卫.基于模型的Web应用测试[J].计算机学报,2011,34(6):1012-1028.
[4] LU Y R,WANG F,DENG B.Combined modeling approach for Web application testing [J].Journal of PLA University of Science and Technology(Natural Science Edition),2013(6):617-622.
[5] THUMMALA S,OFFUTT J.An Evaluation of the Effectiveness of the Atomic Section Model [M]∥Model-Driven Engineering Languages and Systems.2014:35-49.
[6] MARCHETTO A,TONELLA P,RICCA F.State-Based Tes-ting of Ajax Web Applications[C]∥International Conference on Software Testing,Verification,and Validation.IEEE Computer Society,2008:3-12.
[7] ARORA A,SINHA M.Dynamic content testing of Web Application using user session based state testing[C]∥Confluence 2013:the Next Generation Information Technology Summit.2013:22-28.
[8] BHANU K,PRASANTH S,MOHAN G K.A Bot DrivenFramework for Testing Web Applications[J].Asian Journal of Information Technology,2016,5(20):3905-3911.
[9] MANE S S,RAJMANE B A.Automatic Testing of AJAX Applications through Dynamic Analysis of User Interface State Change[J].International Journal of Computer Applications,2014,95(11):12-16.
[10] WANG L N,LI H,ZHAO L.Ajax Web automatic testing model based on simulation of users[J].Journal of Huazhong University of Science and Technology (Natural Science Edition),2016,4(3):1-5.(in Chinese) 王丽娜,李怀,赵磊.基于模拟用户的Ajax Web自动化测试模型[J].华中科技大学学报(自然科学版),2016,44(3):1-5.
[11] HE T,MIAO H K,QIAN Z S.Modeling and Test Case Generation for Ajax-based Web Application [J].Computer Science,2014,41(8):219-223.(in Chinese) 贺涛,缪淮扣,钱忠胜.基于Ajax技术的Web应用的建模与测试用例生成[J].计算机科学,2014,41(8):219-223.
[12] GUO J X,GAO C,XU N S,et al.User Behavior Analysis Based on Web Browsing Log [J],Computer Science,2014,1(3):110-115.(in Chinese) 郭俊霞,高城,许南山,等.基于网页浏览日志的用户行为分析[J].计算机科学,2014,1(3):110-115.
[13] MESBAH A,VAN DEURSEN A.Migrating Multi-page Web Applications to Single-page AJAX Interfaces [C]∥Euromicro Conference on Software Maintenance & Reengineering.2007:181-190.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .