Username   Password       Forgot your password?  Forgot your username? 

 

A Survey of Software Trustworthiness Measurement Validation

Volume 14, Number 9, September 2018, pp. 2056-2065
DOI: 10.23940/ijpe.18.09.p14.20562065

Hongwei Taoa and Yixiang Chenb

aSchool of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
bMoE Engineering Center for Software/Hardware Co-Design Technology and Application, East China Normal University, Shanghai, 200062, China

(Submitted on May 30, 2018; Revised on July 27, 2018; Accepted on August 8, 2018)

Abstract:

The software trustworthiness measurement is an essential research subject in trustworthy software. Software trustworthiness measurement validation can show whether the measurement is adequate for measuring the software trustworthiness. There are many research results in software trustworthiness measurement validation. In this paper, we survey software trustworthiness measurement theoretical validation and empirical validation. The research states of software trustworthiness measurement theoretical validation are summarized from the view of validation based on measurement theory and validation based on axiomatic approaches, and state-of-the-art empirical validation methods are studied through case studies, surveys, and experiments. Lastly, we analyze the challenges faced in software trustworthiness measurement validation.

 

References: 64

                1. M. Nami and W. Suryn, “Case Study: Using Requirements and Finite State Machine for Evaluating Software Trustworthiness,” in Proceedings of 38th Annual Conference on IEEE Industrial Electronics Society, pp. 3095-3100, Montreal, QC, Canada, December 2012
                2. A. Meneely, B. Smith and L. Williams, “Validating Software Metrics: A Spectrum of Philosophies,” ACM Transaction on Software Engineering and Methodology, Vol. 21, No. 4, pp. 1-28, November 2012
                3. L. C. Briand, K. E. Emam and S. Morasca, “On the Application of Measurement Theory in Software Engineering,” Empirical Software Engineering, Vol. 1, No. 1, pp. 61-88, January 1996
                4. G. Poels, “On the Use of A Segmentally Additive Proximity Structure to Measure Object Class Life Cycle Complexity,” Reiner Dumke, Alain Abron (eds) Software Measurement: Current Trends in Research and Practice, Deutscher Universitätsverlag, Wiesbaden, pp. 61-79, 1999
                5. G. Poels and G. Dedene, “Distance-based Software Measurement: Necessary and Sufficient Properties for Software Measures,” Information and Software Technology, Vol. 42, No. 2000, pp. 35-46, June 2000
                6. H. Zuse, “A Framework of Software Measurement,” Walter De Gruyter, Berlin, 1998
                7. L. C. Briand, S. Morasca and V. R. Basili, “Property-based Software Engineering Measurement,” IEEE Transaction on Software Engineering, Vol. 22, No. 1, pp. 68-86, January 1996
                8. B. Kitchenham, S. L. Pfleeger and N. Fenton, “Towards a Framework for Software Measurement Validation,” IEEE Transaction on Software Engineering, Vol. 21, No. 12, pp. 929-943, December 1995
                9. E. J. Weyuker, “Evaluating Software Complexity Measures,” IEEE Transaction on Software Engineering, Vol. 14, No. 9, pp. 1357-1365, September 1988
                10. N. Fenton, “Software Measurement: A Necessary Scientific Basis,” IEEE Transaction on Software Engineering, Vol. 20, No. 3, pp. 199-206, March 1994
                11. C. Wohlin, P. Runeson, M. Host and M. C. Ohlsson, “Experimentation in Software Engineering,” Springer-Verlag, Berlin, 2012
                12. P. Runeson, M. Höst, A. Rainer and B. Regnell, “Case Study Research in Software Engineering: Guidelines and Examples,” John Wiley & Sons Incorporation, Hoboken, 2012
                13. S. L. Pfleeger, “Experimental Design and Analysis in Software Engineering Part 3: Types of Experimental Design,” ACM SIGSOFT Software Engineering Notes, Vol. 20, No. 2, pp. 14-16, December 1995
                14. K. Petersen, and C. Wohlin, “Context in Industrial Software Engineering Research,” in Proceedings of the 3rd ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 401-404, Lake Buena Vista, FL, USA October 2009
                15. D. H. Krantz, R. Luce, P. Suppes and A. Tversky, “Foundations of Measurement, Vol. 1: Additive and Polynomial Representations,” Academic Press, New York, 1971
                16. P. Suppes, D. H. Krantz, R. Luce and A. Tversky, “Foundations of Measurement, Vol. 2: Geometrical, Threshold, and Probabilistic Representations,” Academic Press, London, 1989
                17. H. W. Tao and J. Zhao, “Research of Software Trustworthiness Measurement based on Validation,” in Proceedings of 2016 International Symposium on System and Software Reliability, pp. 7-12, Shanghai, China, October 2016
                18. H. W. Tao and Y. X. Chen, “A Metric Model for Trustworthiness of Softwares,” in Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 69-72, September 2009
                19. L. W. Zhang, Y. X. Chen, Y. Zhou, M. Zhang and J. Y. Zhang, “Stability of Software Trustworthiness Measurements Models,” in Proceedings of IEEE 7th International Conference on Software Security and Reliability Companion, pp. 1-6, Gaithersburg, MD, USA, June 2013
                20. H. W. Tao, Y. X. Chen, and J. M. Pang, “Axiomatic Approaches based Software Trustworthiness Measures,” in Proceedings of International Conference on Applied System Innovation (ICASI 2015), pp. 135-142, Osaka, Japan, May 2015
                21. H. W. Tao and J. Zhao, “An Improved Attributes-Based Software Trustworthiness Metric Model,” Journal of Wuhan University (Natural Science Edition), Vol. 63, No. 2, pp. 151-157, February 2017
                22. H. W. Tao, Y. X. Chen, and J. M. Pang, “A Software Trustworthiness Measurement based on the Decompositions of Trustworthy Attributes and Its Validation,” in Proceedings of International Conference on Industrial Engineering, Management Science and Applications (ICIMSA2015), pp. 981-990, Tokyo, Japan, May 2015
                23. H. W. Tao and Y. X. Chen, “A New Metric Model for Trustworthiness of Softwares,” Telecommunication System, Vol. 51, No. 2-3, pp. 95-105, November 2012
                24. J. Wang, Y. X. Chen, B. Gu, X. Y. Guo, B. H. Wang, S. Y. Jin, et al., “An Approach to Measuring and Grading Software Trust for Spacecraft Software,” Scientia Sinica Techologica, Vol. 45, No. 2, pp. 221-228, February 2015
                25. S. Ding, X. J. Ma, and S. L. Yang, “A Software Trustworthiness Evaluation Model using Objective Weight based Evidential Reasoning Approach,” Knowledge and Information Systems, Vol. 33, No. 1, pp. 171-189, October 2012
                26. S. Ding, S. L. Yang, and C. Fu, “A Novel Evidential Reasoning based Method for Software Trustworthiness Evaluation under the Uncertain and Unreliable Environment,” Expert Systems With Applications, Vol. 39, No. 2012, pp. 2700-2709, August 2012
                27. X. M. Hong and X. F. Zhao, “Method for Software Trustworthiness Evaluation Supporting Dynamic and Multiple Attribute,” Computer Engineering & Science, Vol. 35, No. 6, pp. 107-112, June 2013
                28. A. Immonen and M. Palviainene, “Trustworthiness Evaluation and Testing of Open Source Components,” in Proceedings of the 7th International Conference on Quality Software, pp. 316-321, Portland or USA, November 2007
                29. B. Li and Y. Cao, “An Improved Comprehensive Evaluation Model of Software Dependability based on Rough Set Theory,” Journal of Software, Vol. 4, No. 10, pp. 1152-1159, December 2009
                30. G. H. Shen, Z. Q. Huang, J. Qian, Y. J. Xu, J. Hao, W. Y. Zhao et al., “Research on Software Trustworthiness Evaluation Model and Its Implementation,” Journal of Frontiers of Computer Science and Technology, Vol. 5, No. 6, pp. 553-561, June 2011
                31. H. L. Shi, J. Ma, and F. Y. Zou, “A Fuzzy Comprehensive Evaluation Model for Software Dependability based on Entropy Weight,” in Proceedings of 2008 International Conference on Computer Science and Software Engineering, pp. 683-685, Hubei, China, December 2008
                32. L. Shi, S. L. Yang, K. Li and B. G. Yu, “Developing an Evaluation Approach for Software Trustworthiness using Combination Weights and TOPSIS,” Journal of Software, Vol. 7, No. 3, pp. 532-543, March 2012
                33. S. L. Yang, S. Ding and W. Chu, “Trustworthy Software Evaluation using Utility based Evidence Theory,” Journal of Computer Research and Development, Vol. 46, No. 7, pp. 1152-1159, July 2009
                34. X. H. Yang, X. H. Zhou, J. F. Tian and Z. Li, “Novel Dynamic Trusted Evaluation Model of Software Behavior,” Journal of Chinese Computer Systems, Vol. 31, No. 11, pp. 2113-2120, November 2010
                35. X. H. Li, X. Y. Wang, T. Zhang and J. Yi, “Software Trustworthiness Evaluation based on Weakness Analysis and Testing Assessment,” Journal of Tsinghua University (Science and Technolog), Vol. 51, No. 10, pp. 1287-1293, October 2011
                36. Y. J. Zhang, Y. M. Zhang, and M. Hai, “An Evaluation Model of Software Trustworthiness based on Fuzzy Comprehensive Evaluation Method,” American Journal of Engineering and Technology Research, Vol. 11, No. 9, pp. 1145-1149, August 2011
                37. J. F. Tian, Z. Li, and Y. L. Liu, “An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation,” Journal of Computer Research and Development, Vol. 48, No. 8, pp. 1447-1454, August 2011
                38. Z. Li, J. F. Tian, and P. Y. Zhao, “A Trustworthy Behavior Model for Software Monitoring Point based on Classification Attributes,” Journal of Electronics & Information Technology, Vol. 34, No. 6, pp. 1145-1151, June 2012
                39. Z. Li, J. F. Tian, and X. H. Yang, “Dynamic Trustworthiness Evaluation Model of Software based on Checkpoint’s Classification Attributes,” Journal of Computer Research and Development, Vol. 50, No. 11, pp. 2397-2405, November 2013
                40. Z. Liu, S. M. Bridges, and R. B. Vaughn, “Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models,” in Proceedings of the Third IEEE International Workshop on Information Assurance, pp. 164-177, College Park, MD, USA, March 2005
                41. X. G. Tian, L. Z. Gao, C. L. Sun and E. Y. Zhang, “Anomaly Detection of Program Behaviors based on System Calls and Homogeneous Markov Chain Models,” Journal of Computer Research and Development, Vol. 44, No. 9, pp. 1538-1544, September 2007
                42. J. F. Tian, J. E. Han, R. Z. Du, and Y. Wang, “Creditability Evaluation Model based on Software Behavior Trace,” Journal of Computer Research and Development, Vol. 49, No. 7, pp. 1514-1527, July 2012
                43. J. T. Giffin, D. Dagon, S. Jha, W. Lee and B. P. Miller, “Environment-Sensitive Intrusion Detection,” in proceedings of the 8th International Conference on Recent Advances in Intrusion Detection, pp. 185-206, Seattle, WA, USA, September 2005
                44. Y. L. Liu, R. Z. Du, J. L. Feng and J. F. Tian, “Trust Model of Software Behaviors based On Check Point Risk Assessment,” Journal of Xidian University (Natural Science),Vol. 39, No. 1, pp. 179-184, February 2012
                45. J. F. Tian and Y. J. Zhang, “Checkpoint Trust Evaluation Method based on Markov,” Journal on Communications, Vol. 36, No. 1, pp. 1-7, January 2015
                46. M. Nami and W. Suryn, “From Requirements to Software Trustworthiness using Scenarios and Finite State Machine,” in Proceedings of 38th Annual Conference on IEEE Industrial Electronics Society, pp. 3126-3131, Montreal, QC, Canada, December 2012
                47. F. Zhang, M. D. Xu, and L. You, “A Behavior Modeling Method based on System Call and Algebra Process CCS,” Journal of Wuhan University (Natural Science Edition), Vol. 56, No. 2, pp. 133-137, April 2010
                48. Q. Zhao, H. Q. Wang, G. S. Feng, and J. Zhao, “Measuring Method of Software Dependability based on Pi Calculus,” Journal of Jilin University (Engineering and Technology Edition), Vol. 41, No. 6, pp. 1684-1689, December 2011
                49. N. Fu, X. S. Zhou, and T. Zhan, “QPi: A Calculus to Enforce Trustworthiness Requirements,” Journal of Computer Research and Development, Vol. 48, No. 11, pp. 2120-2130, November 2011
                50. D. Wang, Y. Lu, W. B. Zhao, and L. H. Fu, “Trust-Measuring Model for Software using Dependent Relation between Variables,” Journal of Huazhong University of Science and Technology (Nature Science), Vol. 41, No. 1, pp. 41-45, January 2013
                51. J. Du, “Research on Software Process-Oriented Trustworthiness Evidence Model and Process Trustworthiness Evaluation Method,” Ph. D. dissertation, University of Chinese Academy of Sciences, Beijing, China, 2012
                52. E. Amoroso, J. Watson, T. Nguyen, et al., “Toward An Approach to Measuring Software Trust,” in Proceedings of 1991 IEEE Symposium on Research in Security and Privacy, pp. 198-218, Oakland, CA, USA, May 1991
                53. E. Amoroso, C. Taylor, J. Watson, and J. Weiss, “A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness,” in Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 39-50, Virginia, USA, November 1994
                54. H. P. Zhang, F. D. Shu, Y. Yang, X. Wang, and Q. Wang, “A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes,” in Proceedings of the International Conference on Software Process (ICSP 2010), pp. 297-308, Paderborn, Germany, July 2010
                55. J. Du, Y. Yang, Q. Wang, and M. S. Li, “Evidence-based Trustworthy Software Process Assessment Method,” Journal of Frontiers of Computer Science and Technology, Vol. 5, No. 6, pp. 501-512, June 2011
                56. B. H. Yu, Q. Wang, and Y. Yang, “The Trustworthiness Metric Model of Software Process Quality based-on Life Circle,” in Proceedings of International Conference on Management and Service Science, pp. 1-5, Wuhan, China, September 2009
                57. B. H. Yu, Q. Wang, and Y. Yang, “The Study of Trustworthy Software Process Improvement Model,” in Proceedings of 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 315-318, Wuhan, China, May 2009
                58. G. H. Shen, Z. Q. Huang, B. Xie, Y. Q. Zhu, L. L. Liao, F. Wang et al., “Survey on Software Trustworthiness Evaluation,” Journal of Software, Vol. 27, No. 4, pp. 1-15, April 2016
                59. J. Zhou, M. X. Zhang, “Survey on Trustworthy Software Evaluation,” Application Research of Computers, Vol. 29, No. 10, pp. 3609-3613, October 2012
                60. V. Bianco, L. Lavazza, S. Morasca, and D. Taibi, “A Survey on Open Source Software Trustworthiness,” IEEE Software, Vol. 28, No. 5, pp. 67-75, August 2011
                61. J. P. Li, M. L. Li, D. H. Wu, and H. Song, “An Integrated Risk Measurement and Optimization Model for Trustworthy Software Process Management,” Information Sciences, Vol. 191, pp. 47-60, May 2012
                62. G. N. Si, Y. H. Ren, J. Xu, and J. F. Yang, “A Dependability Evaluation Model for Internetware based on Bayesian Network,” Journal of Computer Research and Development,Vol. 49, No. 5, pp. 1028-1038, May 2012
                63. H. Q. Liang and W. Wu, “Research of Trust Evaluation Model based on Dynamic Bayesian Network,” Journal on Communications, Vol. 34, No. 9, pp. 68-76, September 2013
                64. Y. L. Sun, W. Yu, Z. Han, and K. J. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 305-319, February 2006

                               

                              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                              Attachments:
                              Download this file (14-IJPE-09-14.pdf)14-IJPE-09-14.pdf[A Survey of Software Trustworthiness Measurement Validation]242 Kb
                               
                              This site uses encryption for transmitting your passwords. ratmilwebsolutions.com