Multi-layer software configuration: Empirical study on wordpress

Software can be adapted to different situations and platforms by changing its configuration. However, incorrect configurations can lead to configuration errors that are hard to resolve or understand, especially in the case of multi-layer architectures, where configuration options in each layer might...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) pp. 31 - 40
Main Authors Sayagh, Mohammed, Adams, Bram
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2015
Subjects
Online AccessGet full text
DOI10.1109/SCAM.2015.7335399

Cover

Abstract Software can be adapted to different situations and platforms by changing its configuration. However, incorrect configurations can lead to configuration errors that are hard to resolve or understand, especially in the case of multi-layer architectures, where configuration options in each layer might contradict each other or be hard to trace to each other. Hence, this paper performs an empirical study on the occurrence of multi-layer configuration options across Wordpress (WP) plugins, WP, and the PHP engine. Our analyses show that WP and its plugins use on average 76 configuration options, a number that increases across time. We also find that each plugin uses on average 1.49% to 9.49% of all WP database options, and 1.38% to 15.18% of all WP configurable constants. 85.16% of all WP database options, 78.88% of all WP configurable constants, and 52 PHP configuration options are used by at least two plugins at the same time. Finally, we show how the latter options have a larger potential for questions and confusion amongst users.
AbstractList Software can be adapted to different situations and platforms by changing its configuration. However, incorrect configurations can lead to configuration errors that are hard to resolve or understand, especially in the case of multi-layer architectures, where configuration options in each layer might contradict each other or be hard to trace to each other. Hence, this paper performs an empirical study on the occurrence of multi-layer configuration options across Wordpress (WP) plugins, WP, and the PHP engine. Our analyses show that WP and its plugins use on average 76 configuration options, a number that increases across time. We also find that each plugin uses on average 1.49% to 9.49% of all WP database options, and 1.38% to 15.18% of all WP configurable constants. 85.16% of all WP database options, 78.88% of all WP configurable constants, and 52 PHP configuration options are used by at least two plugins at the same time. Finally, we show how the latter options have a larger potential for questions and confusion amongst users.
Author Adams, Bram
Sayagh, Mohammed
Author_xml – sequence: 1
  givenname: Mohammed
  surname: Sayagh
  fullname: Sayagh, Mohammed
  organization: Polytechnique Montreal, Canada
– sequence: 2
  givenname: Bram
  surname: Adams
  fullname: Adams, Bram
  organization: Polytechnique Montreal, Canada
BookMark eNotj91KwzAYQCMo6OYeQLzJC7QmX5oln1eOMn9gwwv1eqTrFwl0TUk6Rt_egbs6d4dzZuy6jz0x9iBFKaXAp696tS1BSF0apbRCvGIzWS2NMhoQbtki59AIJQQiVOaOvWyP3RiKzk2UeI5-PLlEfB97H36PyY0h9s98fRhCCnvX8Twe24nHnp9iaodEOd-zG--6TIsL5-zndf1dvxebz7ePerUpAgg7FtQ61I04V1jUFry25zYiNI0CwMYYhMa3oIk0kvBLkrY1FlAoaSpNSs3Z4783ENFuSOHg0rS7TKo_KzBJnA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SCAM.2015.7335399
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1467375292
9781467375290
EndPage 40
ExternalDocumentID 7335399
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i208t-eda95b075289582f58399ee97b3229b7792bfd25ee59e0f6e18d7829031745e33
IEDL.DBID RIE
IngestDate Wed May 01 11:50:05 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-eda95b075289582f58399ee97b3229b7792bfd25ee59e0f6e18d7829031745e33
PageCount 10
ParticipantIDs ieee_primary_7335399
PublicationCentury 2000
PublicationDate 20150901
PublicationDateYYYYMMDD 2015-09-01
PublicationDate_xml – month: 09
  year: 2015
  text: 20150901
  day: 01
PublicationDecade 2010
PublicationTitle 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)
PublicationTitleAbbrev SCAM
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib030099247
Score 1.6414196
Snippet Software can be adapted to different situations and platforms by changing its configuration. However, incorrect configurations can lead to configuration errors...
SourceID ieee
SourceType Publisher
StartPage 31
SubjectTerms Context
Engines
Kernel
Linux
Software systems
Title Multi-layer software configuration: Empirical study on wordpress
URI https://ieeexplore.ieee.org/document/7335399
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXg0XZc2a-NJGRtDmAg62G00yYsMtRuzZeBf70vaTRQP3kohNOlr8r7X973vEXIlXQ8qyw3jfWlZzEGzDIE9GkQpbmVqUu0yupOH_nga38_ErEGud7UwAODJZxC4S5_LN0tdul9l3SSKnJBqkzSTRFa1WttvJ3JQh8dJnbjshbL7NLibOO6WCOpxPxqoeP8x2ieT7ZMr2shrUBYq0J-_RBn_O7UD0vmu1KOPOx90SBqQt8mtr6plbxnCafqB5-wmWwPFwNcuXsrK4jd0-L5aeHkQ6hVm6TKnGwxEPS-2Q6aj4fNgzOpOCWzBw7RgYDIpFHp_DJ9Eyq1A2CMBZKJwv0qFb4sra7gAEBJC24deahKXQkX0EAuIoiPSypc5HBOqcaDWCqyQJk4NVzILLWQKwyI83IQ5IW23-vmqEsOY1ws__fv2GdlzFqhIWeekVaxLuEAvXqhLb74vr_WeYQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4QD3pSA8bf9uDRDehWtnrSEAgqIyZCwo2s66sh6iC4hcS_3tduYDQevC1NmrV5Xd_39r73PUKuhOlBpZlyWFtox2eQODECezSIlEyLUIWJyehGw3Z_7D9M-KRCrje1MABgyWfgmkeby1fzJDe_yhqB5xkh1S2yzTGqCIpqrfXp8QzYYX5Qpi5bTdF47txFhr3F3XLmjxYq1oP09ki0fndBHHl180y6yecvWcb_Lm6f1L9r9ejTxgsdkAqkNXJr62qdtxgBNf3Am3YVL4Fi6KtnL3lh8xvafV_MrEAItRqzdJ7SFYailhlbJ-Ned9TpO2WvBGfGmmHmgIoFl-j_MYDiIdMcgY8AEIHEL1bIIBBMasU4ABfQ1G1ohSowSVTEDz4Hzzsk1XSewhGhCU5MEgmaC-WHikkRNzXEEgMjvN64OiY1s_vpopDDmJYbP_l7-JLs9EfRYDq4Hz6ekl1jjYKidUaq2TKHc_TpmbywpvwCMy2hsg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+15th+International+Working+Conference+on+Source+Code+Analysis+and+Manipulation+%28SCAM%29&rft.atitle=Multi-layer+software+configuration%3A+Empirical+study+on+wordpress&rft.au=Sayagh%2C+Mohammed&rft.au=Adams%2C+Bram&rft.date=2015-09-01&rft.pub=IEEE&rft.spage=31&rft.epage=40&rft_id=info:doi/10.1109%2FSCAM.2015.7335399&rft.externalDocID=7335399