\begin{tocenv} \tocitem \@locref{sec2}{\begin{@norefs}\@print{Part I}\quad{}Overview Of mmwsIcm Web Services Testing Framework{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec3}{\begin{@norefs}\@print{1}\quad{}Obtaining Related Software{}\end{@norefs}} \tocitem \@locref{sec4}{\begin{@norefs}\@print{2}\quad{}Related Documents{}\end{@norefs}} \tocitem \@locref{sec5}{\begin{@norefs}\@print{3}\quad{}Part Of A Much Bigger Picture -- ByStar and BISOS{}\end{@norefs}} \tocitem \@locref{sec6}{\begin{@norefs}\@print{4}\quad{}Our Web Services And Remote Operations Model{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec7}{\begin{@norefs}\@print{4.1}\quad{}Structure Of Web Services Implementation (Remote Operations){}\end{@norefs}} \tocitem \@locref{sec8}{\begin{@norefs}\@print{4.2}\quad{}Interactive Command Modules (ICM) Direct And Remote Operations{}\end{@norefs}} \end{tocenv} \tocitem \@locref{sec9}{\begin{@norefs}\@print{5}\quad{}Invokers Development Model{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec10}{\begin{@norefs}\@print{5.1}\quad{}A Graphical Overview Of Invoker ICMs Development Model {}\end{@norefs}} \tocitem \@locref{sec11}{\begin{@norefs}\@print{5.2}\quad{}Invoker ICMs Development Model{}\end{@norefs}} \tocitem \@locref{sec12}{\begin{@norefs}\@print{5.3}\quad{}Invoker Framework: Ingredients{}\end{@norefs}} \tocitem \@locref{sec13}{\begin{@norefs}\@print{5.4}\quad{}Try It Out -- Install The Software And Run The Examples{}\end{@norefs}} \end{tocenv} \end{tocenv} \tocitem \@locref{sec14}{\begin{@norefs}\@print{Part II}\quad{}Command Line Remote Invocation (rinvoker) -- rinvokerPetstore.py Example{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec15}{\begin{@norefs}\@print{6}\quad{}rinvoker Seed Features -- Commands -- Paramters -- Arguments{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec16}{\begin{@norefs}\@print{6.1}\quad{}rinvoker.py Seed Features -- Commands{}\end{@norefs}} \tocitem \@locref{sec17}{\begin{@norefs}\@print{6.2}\quad{}rinvoker.py Seed Features -- Parameters{}\end{@norefs}} \tocitem \@locref{sec18}{\begin{@norefs}\@print{6.3}\quad{}rinvoker.py Seed Features -- Arguments{}\end{@norefs}} \end{tocenv} \tocitem \@locref{sec19}{\begin{@norefs}\@print{7}\quad{}rinvokerPetstore.py Example{}\end{@norefs}} \end{tocenv} \tocitem \@locref{sec20}{\begin{@norefs}\@print{Part III}\quad{}Operation Scenarios -- opScnPetstore.py Example{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec21}{\begin{@norefs}\@print{8}\quad{}Invoke-Specifications, Invoke-Verification, Invoke-Reporting{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec22}{\begin{@norefs}\@print{8.1}\quad{}Model Of Invoke -- Specification, Verification And Reporting -- Scenarios{}\end{@norefs}} \tocitem \@locref{sec23}{\begin{@norefs}\@print{8.2}\quad{}Scenario Specification For Sequences Of Invocations{}\end{@norefs}} \end{tocenv} \tocitem \@locref{sec24}{\begin{@norefs}\@print{9}\quad{}opScn-Seed (Remote Operation Scenarios) -- Commands -- Paramters -- Arguments{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec25}{\begin{@norefs}\@print{9.1}\quad{}opScn Seed Features -- Commands{}\end{@norefs}} \tocitem \@locref{sec26}{\begin{@norefs}\@print{9.2}\quad{}OpScn Outputs And Reportings{}\end{@norefs}} \end{tocenv} \end{tocenv} \tocitem \@locref{sec27}{\begin{@norefs}\@print{Part IV}\quad{}Complete Invoker-Applications Development{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec28}{\begin{@norefs}\@print{10}\quad{}Invoker-Apps Development Model{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec29}{\begin{@norefs}\@print{10.1}\quad{}Invoker-Apps Can Easily Build On unisos.mmwsIcm Capabilities{}\end{@norefs}} \end{tocenv} \end{tocenv} \tocitem \@locref{sec30}{\begin{@norefs}\@print{Part V}\quad{}Security Strategies For Web Services Verification{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec31}{\begin{@norefs}\@print{11}\quad{}IAM and AAA{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec32}{\begin{@norefs}\@print{11.1}\quad{}Incorporation Of Authentication And Tokens In Swagger Specifications{}\end{@norefs}} \tocitem \@locref{sec33}{\begin{@norefs}\@print{11.2}\quad{}IAM Interactions{}\end{@norefs}} \end{tocenv} \tocitem \@locref{sec34}{\begin{@norefs}\@print{12}\quad{}Identification Of Common API Vulnerabilities{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec35}{\begin{@norefs}\@print{12.1}\quad{}Identification Of Some Common API Vulnerabilities{}\end{@norefs}} \end{tocenv} \end{tocenv} \tocitem \@locref{sec36}{\begin{@norefs}\@print{Part VI}\quad{}Benefits Of Adopting This Generalized Swagger Centered Invocation Model{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec37}{\begin{@norefs}\@print{13}\quad{}Benefits And Advantages Of The Generalized Swagger Centered Invocation Model{}\end{@norefs}} \begin{tocenv} \tocitem \@locref{sec38}{\begin{@norefs}\@print{13.1}\quad{}Taking Full Advantage Of Service Specification For Testing And Development{}\end{@norefs}} \end{tocenv} \end{tocenv} \end{tocenv}