Data Model Bugs
In today’s internet-centric world, web applications have replaced desktop applications. Cloud systems are frequently used to store and manage user data. Given the complexity inherent in web applications, it is imperative to ensure that this data is never corrupted. We overview existing techniques for data model verification in web applications, list bugs discovered by these tools, and discuss the impact, difficulty of detection, and prevention of these bugs.
KeywordsData Model Access Control Policy Invalid Data Corrupted Data Open Source Application
Unable to display preview. Download preview PDF.
- 1.Bocić, I., Bultan, T.: Inductive verification of data model invariants for web applications. In: Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), May 2014Google Scholar
- 3.Jackson, D.: Alloy: a lightweight object modelling notation. ACM Transactions on Software Enginnering and Methodology (TOSEM 2002) 11(2), 256–290 (2002)Google Scholar
- 4.Near, J.P., Jackson, D.: Rubicon: bounded verification of web applications. In: Proceedings of the ACM SIGSOFT 20th Int. Symp. Foundations of Software Engineering (FSE 2012), pp. 60:1–60:11 (2012)Google Scholar
- 5.Nijjar, J.: Analysis and Verification of Web Application Data Models. PhD thesis, University of California, Santa Barbara, January 2014Google Scholar