Beruflich Dokumente
Kultur Dokumente
An Introduction Of Web
Engineering
Software Engineering
Computer Science
System Engineeing
Web Engineering
(Web Engineering, The Discipline of Systematic Development of Web Applications, edited by Gerti
Kappel, Birgit Proll, Siegfried Reich, Werner Retschitzegger)
Web Engineering
Web Engineering
Web Engineering
Web Engineering
Web Application
10
Web Application
11
Jurnal, Web Engineering and Perpectives, San Murugesab (SouthernCross University, Australia), Athula
Ginige (University of Western Sydney, Australia)
12
13
Web Engineering, The Discipline of Systematic Development of Web Applications, edited by Gerti Kappel,
Birgit Proll, Siegfried Reich, Werner Retschitzegger
14
Web Engineering, The Discipline of Systematic Development of Web Applications, edited by Gerti Kappel,
Birgit Proll, Siegfried Reich, Werner Retschitzegger
15
Web Engineering, The Discipline of Systematic Development of Web Applications, edited by Gerti Kappel,
Birgit Proll, Siegfried Reich, Werner Retschitzegger
16
Semantic Web
Web Engineering, The Discipline of Systematic Development of Web Applications, edited by Gerti Kappel,
Birgit Proll, Siegfried Reich, Werner Retschitzegger
17
Jurnal, Web Engineering and Perpectives, San Murugesab (SouthernCross University, Australia),
Athula Ginige (University of Western Sydney, Australia)
18
Jurnal, Web Engineering and Perpectives, San Murugesab (SouthernCross University, Australia),
Athula Ginige (University of Western Sydney, Australia)
19
Methods
SAVILLA
21
Phase
22
XP-Iteration Process
24
Referensi
Software Engineering, Addiso Wesley,
Sommerville
Web Engineering, The Discipline of Systematic
Development of Web Applications, edited by Gerti
Kappel, Birgit Proll, Siegfried Reich, Werner
Retschitzegger
Web Engineering, Emilia Mendes and Nile Mosley.
Jurnal, Web Engineering and Perpectives, San
Murugesab (SouthernCross University, Australia),
Athula Ginige (University of Western Sydney,
Australia)
25
REQUIREMENTS ENGINEERING
FOR WEB ENGINEERING
27
28
29
30
31
Bagaimana dengan
Indonesia ?
32
33
34
Multidisciplinarity
35
Unavailability of Stakeholders
36
The quality of the user interface is another successcritical aspect of Web applications. When
developing Web applications developers need to
be aware of the IKIWISI (I Know It When I See It)
phenomenon: users will not be able to understand
and evaluate a Web application by just looking at
abstract models and specications; rather they
need to experiment with it. It is thus absolutely
essential to complement the denition and
description of requirements by adding prototypes
of important application scenarios (Constantine
39
and Lockwood 2001).
40
Quality of Content
42
Developer Inexperience
43
44
45
46
48
Risk Orientation
50
Sevilla
51
Requirement Types
Functional Requirements
52
Requirement Types
Contents Requirements
53
Requirement Types
Quality Requirements
54
57
Requirement Types
Requirement Types
Evolution Requirements
59
Referensi
60
61
62
63
64
65
66
67
SEVILLA
68
69
70
71
72
73
74
75
76
77
78
79
80
Referensi
Web Engineering, The Discipline of Systematic
Development of Web Applications, edited by Gerti
Kappel, Birgit Proll, Siegfried Reich, Werner
Retschitzegger
PPT, Uwe savilla.
81
Web Engineering
Architecture
Architecture
(Kruchten 1995,Hofmeister et al. 1995)Architecture can be
looked at from different viewpoints:
(1) the conceptual view, which identies entities of the
application domain and their relationships;
(2) the runtime view, which describes the components at
system runtime, e.g., servers, or communication
connections;
(3) the process view, which maps processes at system
runtime, while looking at aspects like synchronization and
concurrency; and
(4) the implementation view, which describes the systems
software artifacts,
84
Architecture
Architecture
86
Architecture
Pattern
Patterns (see Gamma et al. 1997, Buschmann et al.
1996, Buschmann et al. 2000) describe recurring
design problems, which arise in a specic design
context, and propose solutions.
87
Pattern
Architecture
Frameworks
89
90
91
92
JSP - Architecture
93
Struts - Architecture
94
OOHDM-Java2 Architecture
95
Portal - Architecture
96
97
98
Referensi
Web Engineering, The Discipline of Systematic
Development of Web Applications, edited by Gerti
Kappel, Birgit Proll, Siegfried Reich, Werner
Retschitzegger
http://www.springsource.org/
http://struts.apache.org/
99
Technology-aware Web
Application Design
DR. WINDU GATA, M.KOM
100
101
Hypertext
Hypertext Markup Languange (HTML)
XML
102
Hypertext
103
HTML
1997, already supported other media : images, timesensitive media such as video and audio, etc.
Availability :
Can be understood as a classic document hypertext
Text-centric
104
XML
1998
SGML (Standardized Generic Markup Language)
defines valid tags and rules.
DTD (Document Type Definitions) XML-DTDs
XML-schemas.
EDI Electronic Data Interchange
XHTML xml + html
WML WAP
105
Where am I ?
Where was I ?
Where can I go ?
106
107
108
Web Services
Web Server
SMTP Simple Mail Transfer Protocol
SMTP (Simple Mail Transfer Protocol Postel 1982),
combined with POP3 (Post Ofce Protocol)
E-mails
110
111
Client Side
Java Applets
Java applets are programs written in Java that are
loaded dynamically into the browser.
ActiveX Controls
With ActiveX Controls, Microsoft has enabled the use
of its COM component technology in Web browsers
(Denning 1997).
112
Document-specic Technologies
113
Server-side Technologies
URI Handlers
Server-Side Includes (SSI)
CGI/FastCGI
Server-side Scripting
-
Servlets
-
114
ASP.NET
115
Web Services
116
Middleware Technologies
Application Servers
Application servers are closely related to the concept of a 3layer architecture. They denote a software platform used to
process online transactions (OLTP). A 3-layer architecture
moves the application logic from the client to the application
server.
117
118
Messaging Systems
Messaging systems offer message-based, asynchronous
communication between systems in a
119
Referensi
120
121
122
123
124
Quality Characteristics
125
TEST LEVELS
126
TEST LEVEL
127
Conventional Approaches
129
130
131
Testing Security
132
TEST TOOLS
TEST TOOLS
134
Messaging Systems
Messaging systems offer message-based, asynchronous
communication between systems in a
135
Operation and
Maintenance of Web
Application
136
138
139
Newsletters
Afliate Marketing
Search Engine Marketing
Search Engine Submission
Search Engine Ranking
Content-related Marketing
Domain Management
Content Management
Content Syndication
140
Usage Analysis
Statistical Indicators
142
Referensi
143
Web Project
Management
DR. WINDU GATA, M.KOM
144
146
147
148
149
150
Leadership challengers
151
Development Challenges
152
Monitoring Challenges
Novelty
Dynamics
Parallelism
Continuity
Juvenile
Immaturity
154
156
157
158
Risk Management
159
Referensi
160
161
162
163
164
165
166
167
168
169
Referensi
170
USEBILITY
USEBILITY
171
Usability
172
Usability
173
Aspects
174
175
176
DES Encryption
177
Asymmetric Encryption
178
179
Point-to-Point Security
The SSL Handshake Protocol
1. The client sends a request to the server in order to establish a secure connection
containing information about its cryptographic settings.
2. The server replies with its cipher settings and its certificate for authentication.
3. The client checks the servers certificate validity (as described below).
4. The client generates a so-called pre-master secret based on the data exchanged
so far, encrypts it using the servers public key, and sends it to the server.
5. Client and server generate the master secret based on the pre-master secret.
6. Using the master secret, both client and server generate the symmetric session
key.
7. The client informs the server that future messages will be encrypted. An
additional, already encrypted message is sent to the server stating that the
clients part of the SSL handshake is completed.
8. The server informs the client that future messages will be encrypted. Analogously
to the client, it sends an additional encrypted message stating that the server part
of the SSL handshake is completed.
180
Point-to-Point Security
Server Certificate Validation
1. First, the client checks whether the issuing CA is trusted. Each client maintains a
list of trusted CAs. The issuing CA is trusted if it is part of the list, or if a certificate
chain can be determined that ends up in a CA which is contained in the clients
list.
2. Next, the digital signature of the certificate is evaluated using the issuing CAs
public key.
3. Subsequently, the validity period is examined, i.e., it is ascertained whether the
current date is within the certificates validity period.
4. Then, the domain name listed in the certificate is compared with the servers
domain name for equality.
5. So far, the certificates validity is determined. Now the certificate revocation list is
checked to see if the certificate has been revoked.
181
End-to-End Security
182
End-to-End Security
183
End-to-End Security
184
Authorization
185
Preserving Privacy
Mobile Code Security
Phishing and Web Spoofing
Desktop Security
186
Referensi
Web Engineering, The Discipline of Systematic
Development of Web Applications, edited by Gerti
Kappel, Birgit Proll, Siegfried Reich, Werner
Retschitzegger
187
188
Software Agents
Autonomy
: Agents operate without the direct intervention of humans, and have some kind
of control over their actions and internal states.
Social ability : Agents interact with other agents and humans in some kind of agent
communication language.
Reactivity
Proactivity
: Agents do not simply act in response to their environment; they are able to
exhibit goal-directed behavior by taking the initiative.
Temporal continuity : Agents are continuously running processes (either active in the
foreground or sleeping/passive in the background), not once-only
computations or scripts that map a single input to a single output and
then terminate.
Goal orientedness : Agents are capable of handling complex, high-level tasks. The agent
itself should make the decision how such a task is best split up into
smaller sub-tasks, and in which order and in what way these sub-tasks
should be best performed.
189
190
191
Technological Concepts
192
193