Slicing based Reverse Engineering of Business Applications

被引:0
|
作者
Surendran, Anupama [1 ]
Samuel, Philip [2 ]
机构
[1] Cochin Univ Sci & Technol, Dept Comp Sci, Kochi 22, Kerala, India
[2] Cochin Univ Sci & Technol, SOE, Kochi 22, Kerala, India
关键词
Reverse engineering; Forward Slices; Brokerage system; PROGRAM; MAINTENANCE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Without altering the skeletal framework of the software system, reverse engineering enables an in-depth understanding of the software system by retrieving the most relevant properties of it. This has tremendously increased the need to design effective methods for performing reverse engineering in software system. In this paper, we introduce a forward slicing approach for performing reverse engineering in business applications. The relevance of other slicing methods in reverse engineering is also discussed. An appealing aspect of this work is that, using forward slicing in business applications makes the whole reverse engineering process more direct and effective. Some illustrations which highlight the easiness of the proposed slicing method are also provided to affirm the significance of this work
引用
收藏
页码:673 / 679
页数:7
相关论文
共 50 条
  • [31] Knowledge Based Reverse Engineering-An Approach for Reverse Engineering of a Mechanical Part
    Durupt, A.
    Remy, S.
    Ducellier, G.
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2010, 10 (04)
  • [33] E-BUSINESS APPLICATIONS IN ENGINEERING EDUCATION
    Zascerinska, Jelena
    Ahrens, Andreas
    ICE-B 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2010, : 41 - 46
  • [34] Business models of network slicing
    Kuklinski, Slawomir
    Tomaszewski, Lechoslaw
    Kozlowski, Krzysztof
    Pietrzyk, Slawomir
    PROCEEDINGS OF THE 2018 9TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2018, : 39 - 43
  • [35] A slicing technique for business processes
    Best, Eike
    Rakow, Astrid
    INFORMATION SYSTEMS AND E-BUSINESS TECHNOLOGIES, 2008, 5 : 45 - 51
  • [36] Engineering of Services and Business Models for Grid Applications
    Falkner, Juergen
    Weisbecker, Anette
    GRID ECONOMICS AND BUSINESS MODELS, 2009, 5745 : 140 - 149
  • [37] Engineering privacy requirements in business intelligence applications
    Chiasera, Annamaria
    Casati, Fabio
    Daniel, Florian
    Velegrakis, Yannis
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 219 - 228
  • [38] GXL-based repository of multi-languages applications for reverse engineering process
    Deruelle, L
    Bouneffa, M
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2003, : 276 - 281
  • [39] Automated reverse engineering of role-based access control policies of web applications
    Ha Thanh Le
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel Claude
    Nguyen, Cu Duy
    JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 184
  • [40] Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    Suarez-Albela, Manuel
    Castedo, Luis
    SENSORS, 2017, 17 (01)