Proceedings of the 22nd International Conference on World Wide Web 2013
DOI: 10.1145/2488388.2488512
|View full text |Cite
|
Sign up to set email alerts
|

Inferring dependency constraints on parameters for web services

Abstract: Recently many popular websites such as Twitter and Flickr expose their data through web service APIs, enabling third-party organizations to develop client applications that provide functionalities beyond what the original websites offer. These client applications should follow certain constraints in order to correctly interact with the web services. One common type of such constraints is Dependency Constraints on Parameters. Given a web service operation O and its parameters Pi, Pj,…, these constraints describ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
2

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 19 publications
0
23
2
Order By: Relevance
“…InteGuard [24] performs security checks over a set of invariant relations among HTTP interactions to defeat logic attack at runtime. INDICATOR [29] employs hybrid analysis to infer the dependency constraints on parameters for web services. Guha et al [30] extracted event graphs from client-side web applications and detect malicious client behaviors at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…InteGuard [24] performs security checks over a set of invariant relations among HTTP interactions to defeat logic attack at runtime. INDICATOR [29] employs hybrid analysis to infer the dependency constraints on parameters for web services. Guha et al [30] extracted event graphs from client-side web applications and detect malicious client behaviors at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…These clients invoke different sets of independent methods denoted in Figure 2 by rectangles (e.g., Client1 invokes setBillingAddress(), setShippingAddress(), and setPriorityShipment()). These methods are considered independent because the invocation of one method does not require the invocation of the other ones [20]. In total there are 13 remote invocations: 3 performed by Client1, 3 by Client2, 3 by Client3, and 4 by Client4.…”
Section: B Solutionmentioning
confidence: 99%
“…In this paper we do not cover the problem of mining independent methods because it has already been subject of related work [20] that can be integrated in our approach. Furthermore, related work [20] shows that 78.1% of the methods in their analyzed web services are independent.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Inferring data contract for Web services from API documentation has attracted many interests for the above reasons [6,9]. These approaches first use predefined template to extract candidate data contracts and then validate them by testing services or manually investigation.…”
Section: Introductionmentioning
confidence: 99%