期刊文献+

CEclipse:一个基于服务组合的在线集成开发环境 被引量:1

CEclipse:A Services Composition Based Online IDE
下载PDF
导出
摘要 随着云计算概念的提出,越来越多的桌面应用被迁移到云中,其中桌面集成开发环境的迁移也成为近些年讨论的热点.介绍了一个在线集成开发环境CEclipse(Cloud Eclipse).CEclipse通过将桌面集成开发环境Eclipse的功能封装成服务,然后利用服务组合的技术有机地结合在一起,形成了在线集成开发环境的核心功能.同时利用程序静态分析和程序动态分析等技术,解决了在线集成开发环境中特有的安全问题.其次,为了发挥在线开发的优势,CEclipse提出了利用数据挖掘等技术来挖掘用户在编程过程中的各种行为,以指导用户更快更好地进行在线程序开发,从而增强其用户体验.除此之外,CEclipse具有良好的可扩展性:1)利用单点登录等技术支持其他已有在线服务的快速整合;2)提出了一套半自动化的方法,将Eclipse插件快速迁移到CEclipse中. With the introduction of the concept of cloud computing, many desktop applications have been migrated into the cloud. The desktop Integrated Development Environment (IDE) has become a hot topic in recent years. This paper introduces CEc environment. CEclipse encapsulates the functions of ipse which is an online integrated development ocal IDE into Web services, and then uses the services composition technology to combine all the services to form the core functions of online IDE. Besides, CEclipse utilizes the program static analysis and program dynamic analysis technologies to handle with the specific security issues of online IDE. In order to fully take advantage of online IDE, CEclipse proposes to use the data mining technology to explore the development behavior of the programmers, and use the mining result to give instructions to the programmers in their development process. Finally, CEclipse makes use of single sign on technology to integrate the existing Web application into online IDE, and proposes a suite of approach to semi-automatically migrate the function of eclipse plugin to the online IDE, so that it can improve the expansibility of the online IDE.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第6期1324-1334,共11页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2009CB320703) 国家自然科学基金项目(60821003 61033006) 国家科技重大专项基金项目(2011ZX01043-001-002)
关键词 云计算 在线集成开发环境 服务组合 程序分析 迁移 可扩展 cloud computing online integrated development environment services composition program analysis migration scalable
  • 相关文献

参考文献23

  • 1van Deursen A, Mesbah A, Cornelissen B, et al. Adinda: A knowledgeable, browser-based IDE [C] //Proe of the 32nd ACM/IEEE Int Conf on Software Engineering ICSE'10. New York: ACM, 2010:203-206.
  • 2Milanovic N, Malek M. Current solutions for Web service composition [J]. IEEE Internet Computing, 2004, 8(6): 51-59.
  • 3Thuraisingham B, Hamlen K W. Challenges and future directions of software technology: Secure software development, Invited paper [C] //Proc of the 34th IEEE Annual Int Computer Security and Applications Conf. Piscataway, NJ: IEEE, 2010:51-59.
  • 4Lerner D, Shacham H. An empirical study of privacy violating information flows in JavaScript Web applications [C] //Proc of the 17th ACM Conf on Computer and Communications Security CCS'10. New York: ACM, 2010: 43-51.
  • 5Ciampa A, Visaggio C, Di Penta M. A heuristic-based approach for detecting SQL injection vulnerabilities in Web applications [C] //Proc of the 2010 ICSE Workshop on Software Engineering for Secure Systems. New York: ACM, 2010:43-49.
  • 6Halfond W, Orso A, Manolios P. WASP: Protecting Web applications using positive tainting and syntax aware evaluation[J]. IEEE Trans on Software Engineering, 2007, 34(1): 65-81.
  • 7Tripp O, Pistoia M, Fink S J, et al. TAJ: Effective taint analysis of Web applications [C] //Proc of the 2009 ACM SIGPLAN Conf on Programming Language Design and Implementation. New York: ACM, 2009:87-97.
  • 8Nguyen Tuong A, Guarnieri S, Greene D, et al. Automatically hardening Web applications using precise tainting [J]. Security and Privacy in the Age of Ubiquitous Computing, 2005, 167 : 295-307.
  • 9Ayewah N, Hovemeyer D, Morgenthaler J D, et al. Using static analysis to find bugs [J]. Software, 2008, 25(5): 22- 29.
  • 10Chess B, West J. Secure Programming with Static Analysis [M]. Reading, MA: Addison Wesley, 2007.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部