Publications
List of Publications
Business Informatics Group, TU Wien
Plug & Play Model Transformations - A DSL for Resolving Structural Metamodel Heterogeneities
Manuel WimmerGerti KappelAngelika KuselWerner RetschitzeggerJohannes SchönböckWieland Schwinger
Wimmer, M., Kappel, G., Kusel, A., Retschitzegger, W., Schönböck, J., & Schwinger, W. (2010). Plug & Play Model Transformations - A DSL for Resolving Structural Metamodel Heterogeneities. In Proceedings of the 10th Workshop on Domain-Specific Modeling (DSM´10) @ Splash 2010 (p. 6). Online Publication. http://hdl.handle.net/20.500.12708/53240
A recommender for conflict resolution support in optimistic model versioning
Petra KaufmannMartina SeidlGerti KappelKeywords:
Astract: The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contradicting. For code as well as for any other artifact the resolution support moves hardly beyond the choices "keep mine", "keep theirs", "take all changes", or "abandon all changes".
To ease the conflict resolution in the context of model versioning, we propose a recommender system which suggests automatically executable resolution patterns to the developer responsible for the conflict resolution. The lookup algorithm is based on a similarity-aware graph matching approach incorporating information from the metamodel of the used modeling language. This allows not only the retrieval of recommendations exactly matching the given conflict situation, but also the identification of similar conflict situations whose resolution patterns are adaptable to the current conflict.
Kaufmann, P., Seidl, M., & Kappel, G. (2010). A recommender for conflict resolution support in optimistic model versioning. In Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion - SPLASH ’10. Onward! 2010, Reno/Tahoe, Nevada, USA, Non-EU. ACM. https://doi.org/10.1145/1869542.1869549
A bottom-up approach to build XML business document standards
Philipp LieglChristian HuemerChristian PichlerKeywords:
Astract: XML has replaced traditional EDI standards in the field of business document standardization. Despite of the syntax, the principal approach to develop business document standards has not changed. A standardized business document is built by a superset of all elements that may appear in any business context, leading to overloaded and complex standards. However, in a particular partnership only a small percentage of the elements is used. This results in a top-down approach starting from a generic document and specifying partner-specific subsets. Such an approach is too costly for small and medium-sized enterprises (SME), because agreements on subsets must be implemented in their software systems. As an alternative we suggest a bottom-up solution that starts from a core set of elements, representing the intersection of all industry contexts. Thereby, the core set may be extended to incorporate the needs of a specific business context. In this paper we examine different mechanisms provided by XML Schema to realize such an extension. The applicability of the different mechanisms is evaluated by means of the Austrian e-Invoicing standard ebInterface, which we co-authored.
Liegl, P., Huemer, C., & Pichler, C. (2010). A bottom-up approach to build XML business document standards. In Proceedings of the 7th IEEE International Conference on e-Business Engineering (pp. 56–63). IEEE. http://hdl.handle.net/20.500.12708/53279
From Economic Drivers to B2B Process Models: a Mapping from REA to UMM
Rainer SchusterThomas MotalChristian HuemerHannes WerthnerWitold AbramowiczRobert TolksdorfKeywords:
Astract: Inter-organizational B2B systems are most likely tending to change their business requirements over time - e.g. establishing new partnerships or change existing ones. The problem is that business analysts design the business processes from scratch, disregarding the economic drivers of the business network. We propose to use business modeling techniques - such as REA (Resource-Event-Agents) - to ensure that business processes beneath do not violate the domain rules, i.e. to ful ll the basic economic principle for every business transaction - the give-andtake convention, called economic reciprocity. This helps us to quickly adapt the B2B processes to changing requirements without the need to change the overall architecture. In this paper we provide a mapping from REA, which represents one of the most prominent ontologies for business modeling, to UMM (UN/CEFACT's Modeling Methodology), a standardized methodology for modeling the global choreography of interorganizational business processes. We formalize the mapping by the use of the model-to-model transformation language ATL (Atlas Transformation Language).
Schuster, R., Motal, T., Huemer, C., & Werthner, H. (2010). From Economic Drivers to B2B Process Models: a Mapping from REA to UMM. In W. Abramowicz & R. Tolksdorf (Eds.), Business Information Systems - 13th International Conference, BIS 2010, Berlin, Germany, May 3-5, 2010, Proceedings (pp. 119–131). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-12814-1_11
Keywords:
Astract: Optimistic version control systems enable globally distributed teams of developers to work together asynchronously. Every developer works on a local copy and consequently, no developer is ever detracted from working by waiting for a resource. The price for this flexibility is payed at the moment when conflicting modifications must be integrated into one consolidated version.
In this paper, we discuss conflicts and their need for resolution in the context of model versioning and provide the basic concepts necessary to build a model versioning system which guides modelers through the critical consolidation phase by recommending suitable patterns.
Kaufmann, P., Wieland, K., & Kappel, G. (2010). Conflict Resolution in Model Versioning. In 1st International Master Class on Model-Driven Engineering, Poster Session Companion (pp. 17–18). http://hdl.handle.net/20.500.12708/53418
Registry Support for Core Component Evolution
Christian PichlerPhilip LangerManuel WimmerChristian HuemerBirgit Hofreiter
Pichler, C., Langer, P., Wimmer, M., Huemer, C., & Hofreiter, B. (2010). Registry Support for Core Component Evolution. In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2010) (pp. 1–9). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53498
Automated Security Test Approach for SIP based VoIP Softphones
Stefan TaberChristian SchanesClemens HlauschekFlorian FankhauserThomas GrechenigKeywords:
Astract: Robustness of applications used for Voice
over Internet Protocol based systems against attacks
is a critical part to secure such systems. Automatic
security testing is required to detect security vulnera-
bilities in an efficient way. This enables to harden the
applications early during the development phase. In the
paper we present a fuzzer framework to detect security
vulnerabilities in Voice over IP (VoIP) Softphones which
implement Session Initiation Protocol (SIP). The pre-
sented approach automates the Graphical User Interface
(GUI) interaction for softphones during fuzzing and
also observes the behavior of the softphone GUIs to
automatically detect application errors. Results of testing
two open source softphones by using our fuzzer showed
that various unknown vulnerabilities could be identified
with the implemented fuzzer and some vulnerabilities
were found that are only detectable by using GUI
observation.
Taber, S., Schanes, C., Hlauschek, C., Fankhauser, F., & Grechenig, T. (2010). Automated Security Test Approach for SIP based VoIP Softphones. In Proceedings of The Second International Conference on Advances in System Testing and Validation Lifecycle (pp. 114–119). IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/53539
A Robust and Flexible Test Environment for VoIP Security Tests.
Maximilian RonnigerFlorian FankhauserChristian SchanesThomas GrechenigKeywords:
Astract: Voice over IP (VoIP) is in wide use today, replacing
phone lines in many scenarios. However, often, security
isn´t considered well enough, even though many security
attacks are already known. More research on VoIP security
is needed to enhance the level of security of VoIP systems
and to show the implications of failing to take appropriate
security measures. This paper presents an architecture and
implementation of a robust and flexible VoIP test environ-
ment for security related tests. Experiences using the im-
plemented environment for different VoIP security tests are
shown to demonstrate the suitability of the proposed test en-
vironment for research purposes.
Ronniger, M., Fankhauser, F., Schanes, C., & Grechenig, T. (2010). A Robust and Flexible Test Environment for VoIP Security Tests. In Proceedings of The 5th International Conference for Internet Technology and Secured Transactions (pp. 96–101). Infonomics Society, UK. http://hdl.handle.net/20.500.12708/53543
Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service.
Peter SteinbacherFlorian FankhauserChristian SchanesThomas GrechenigKeywords:
Astract: One of the main security ob jectives for systems connected
to the Internet which provide services like Voice over Inter-
net Protocol (VoIP) is to ensure robustness against security
attacks to fulfill Quality of Service (QoS). To avoid system
failures during attacks service providers have to integrate
countermeasures which have to be tested. This work evalu-
ates a test approach to determine the efficiency of counter-
measures to fulfill QoS for Session Initiation Protocol (SIP)
based VoIP systems even under attack. The main ob jective
of the approach is the evaluation of service availability of a
System Under Test (SUT) during security attacks, e.g., De-
nial of Service (DoS) attacks. Therefore, a simulated system
load based on QoS requirements is combined with different
security attacks. The observation of the system is based
on black-box testing. By monitoring quality metrics of SIP
transactions the behavior of the system is measurable. The
concept was realized as a prototype and was evaluated using
different VoIP systems. For this, multiple security attacks
are integrated to the testing scenarios. The outcome showed
that the concept provides sound test results, which reflect
the behavior of SIP systems availability under various at-
tacks. Thus, security problems can be found and QoS for
SIP-based VoIP communication under attack can be pre-
dicted.
Steinbacher, P., Fankhauser, F., Schanes, C., & Grechenig, T. (2010). Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service. In Proceedings of IPTComm 2010 Principles, Systems and Applications of IP Telecommunications (pp. 107–116). Technische Universität München, Germany. http://hdl.handle.net/20.500.12708/53544
Mining security changes in freebsd
Andreas MauczkaChristian SchanesFlorian FankhauserMario BernhartThomas GrechenigKeywords:
Astract: Current research on historical project data is rarely
touching on the subject of security related information. Learning
how security is treated in projects and which parts of a software
are historically security relevant or prone to security changes can
enhance the security strategy of a software project. We present
a mining methodology for security related changes by modifying
an existing method of software repository analysis. We use the
gathered security changes to find out more about the nature
of security in the FreeBSD project and we try to establish a
link between the identified security changes and a tracker for
security issues (security advisories). We give insights how security
is presented in the FreeBSD project and show how the mined
data and known security problems are connected.
Mauczka, A., Schanes, C., Fankhauser, F., Bernhart, M., & Grechenig, T. (2010). Mining security changes in freebsd. In Proceedings of 7th IEEE Working Conference on Mining Software Repositories (MSR) (pp. 90–93). IEEE. http://hdl.handle.net/20.500.12708/53545