Int J Performability Eng ›› 2018, Vol. 14 ›› Issue (9): 2056-2065.doi: 10.23940/ijpe.18.09.p14.20562065
Previous Articles Next Articles
Hongwei Taoa and Yixiang Chenb, *
Revised on
;
Accepted on
Contact:
* E-mail address: Hongwei Tao and Yixiang Chen. A Survey of Software Trustworthiness Measurement Validation [J]. Int J Performability Eng, 2018, 14(9): 2056-2065.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] M. Nami and W. Suryn, “Case Study: Using Requirements and Finite State Machine for Evaluating Software Trustworthiness,” in [2] A. Meneely, B. Smith and L. Williams, “Validating Software Metrics: A Spectrum of Philosophies,” [3] L. C. Briand, K. E.Emam and S. Morasca, “On the Application of Measurement Theory in Software Engineering,” [4] G. Poels, “On the Use of A Segmentally Additive Proximity Structure to Measure Object Class Life Cycle Complexity,” Reiner Dumke, Alain Abron (eds) Software Measurement: Current Trends in Research and Practice, Deutscher Universitätsverlag, Wiesbaden, pp. 61-79, 1999 [5] G. Poels and G. Dedene, “Distance-based Software Measurement: Necessary and Sufficient Properties for Software Measures,” [6] H. Zuse, “A Framework of Software Measurement,” Walter De Gruyter, Berlin, 1998 [7] L. C. Briand, S. Morasca and V. R. Basili, “Property-based Software Engineering Measurement,” [8] B. Kitchenham, S. L.Pfleeger and N. Fenton, “Towards a Framework for Software Measurement Validation,” [9] E. J. Weyuker, “Evaluating Software Complexity Measures,” [10] N. Fenton, “Software Measurement: A Necessary Scientific Basis,” [11] C. Wohlin, P. Runeson, M. Host and M. C. Ohlsson, “Experimentation in Software Engineering,” Springer-Verlag, Berlin, 2012 [12] P. Runeson, M. Höst, A. Rainer and B. Regnell, “Case Study Research in Software Engineering: Guidelines and Examples,” John Wiley & Sons Incorporation, Hoboken, 2012 [13] S. L. Pfleeger, “Experimental Design and Analysis in Software Engineering Part 3: Types of Experimental Design,” [14] K. Petersen,C. Wohlin, “Context in Industrial Software Engineering Research,” in [15] D. H. Krantz, R. Luce, P. Suppes and A. Tversky, “Foundations of Measurement, Vol. 1: Additive and Polynomial Representations,” Academic Press, New York, 1971 [16] P. Suppes, D. H. Krantz, R. Luce and A. Tversky, “Foundations of Measurement, Vol. 2: Geometrical, Threshold, and Probabilistic Representations,” Academic Press, London, 1989 [17] H. W.Tao and J. Zhao, “Research of Software Trustworthiness Measurement based on Validation,” in [18] H. W.Tao and Y. X. Chen, “A Metric Model for Trustworthiness of Softwares,” in [19] L. W. Zhang, Y. X. Chen, Y. Zhou, M. Zhang and J. Y. Zhang, “Stability of Software Trustworthiness Measurements Models,” in [20] H. W. Tao, Y. X. Chen,J. M. Pang, “Axiomatic Approaches based Software Trustworthiness Measures,” in [21] H. W.Tao and J. Zhao, “An Improved Attributes-Based Software Trustworthiness Metric Model,” [22] H. W. Tao, Y. X. Chen,J. M. Pang, “A Software Trustworthiness Measurement based on the Decompositions of Trustworthy Attributes and Its Validation,” in [23] H. W.Tao and Y. X. Chen, “A New Metric Model for Trustworthiness of Softwares,” [24] J. Wang, Y. X. Chen, B. Gu, X. Y. Guo, B. H. Wang, S. Y. Jin, et al., “An Approach to Measuring and Grading Software Trust for Spacecraft Software,” [25] S. Ding, X. J. Ma,S. L. Yang, “A Software Trustworthiness Evaluation Model using Objective Weight based Evidential Reasoning Approach,” [26] S. Ding, S. L. Yang,C. Fu, “A Novel Evidential Reasoning based Method for Software Trustworthiness Evaluation under the Uncertain and Unreliable Environment,” [27] X. M.Hong and X. F. Zhao, “Method for Software Trustworthiness Evaluation Supporting Dynamic and Multiple Attribute,” [28] A. Immonen and M. Palviainene, “Trustworthiness Evaluation and Testing of Open Source Components,” in [29] B. Li and Y. Cao, “An Improved Comprehensive Evaluation Model of Software Dependability based on Rough Set Theory,” [30] G. H. Shen, Z. Q. Huang, J. Qian, Y. J. Xu, J. Hao, W. Y.Zhao et al., “Research on Software Trustworthiness Evaluation Model and Its Implementation,” [31] H. L. Shi, J. Ma,F. Y. Zou, “A Fuzzy Comprehensive Evaluation Model for Software Dependability based on Entropy Weight,” in [32] L. Shi, S. L. Yang, K. Li and B. G. Yu, “Developing an Evaluation Approach for Software Trustworthiness using Combination Weights and TOPSIS,” [33] S. L. Yang, S. Ding and W. Chu, “Trustworthy Software Evaluation using Utility based Evidence Theory,” [34] X. H. Yang, X. H. Zhou, J. F.Tian and Z. Li, “Novel Dynamic Trusted Evaluation Model of Software Behavior,” [35] X. H. Li, X. Y. Wang, T. Zhang and J. Yi, “Software Trustworthiness Evaluation based on Weakness Analysis and Testing Assessment,” [36] Y. J. Zhang, Y. M. Zhang,M. Hai, “An Evaluation Model of Software Trustworthiness based on Fuzzy Comprehensive Evaluation Method,” [37] J. F. Tian, Z. Li,Y. L. Liu, “An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation,” [38] Z. Li, J. F. Tian,P. Y. Zhao, “A Trustworthy Behavior Model for Software Monitoring Point based on Classification Attributes,” [39] Z. Li, J. F. Tian,X. H. Yang, “Dynamic Trustworthiness Evaluation Model of Software based on Checkpoint’s Classification Attributes,” [40] Z. Liu, S. M. Bridges,R. B. Vaughn, “Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models,” in [41] X. G. Tian, L. Z. Gao, C. L.Sun and E. Y. Zhang, “Anomaly Detection of Program Behaviors based on System Calls and Homogeneous Markov Chain Models,” [42] J. F. Tian, J. E. Han, R. Z. Du,Y. Wang, “Creditability Evaluation Model based on Software Behavior Trace,” [43] J. T. Giffin, D. Dagon, S. Jha, W. Lee and B. P. Miller, “Environment-Sensitive Intrusion Detection,” in [44] Y. L. Liu, R. Z. Du, J. L.Feng and J. F. Tian, “Trust Model of Software Behaviors based On Check Point Risk Assessment,” [45] J. F.Tian and Y. J. Zhang, “Checkpoint Trust Evaluation Method based on Markov,” [46] M. Nami and W. Suryn, “From Requirements to Software Trustworthiness using Scenarios and Finite State Machine,” in [47] F. Zhang, M. D. Xu,L. You, “A Behavior Modeling Method based on System Call and Algebra Process CCS,” [48] Q. Zhao, H. Q. Wang, G. S. Feng,J. Zhao, “Measuring Method of Software Dependability based on Pi Calculus,” [49] N. Fu, X. S. Zhou,T. Zhan, “QPi: A Calculus to Enforce Trustworthiness Requirements,” [50] D. Wang, Y. Lu, W. B. Zhao,L. H. Fu, “Trust-Measuring Model for Software using Dependent Relation between Variables,” [51] J. Du, “Research on Software Process-Oriented Trustworthiness Evidence Model and Process Trustworthiness Evaluation Method,” Ph. D. dissertation, University of Chinese Academy of Sciences, Beijing, China, 2012 [52] E. Amoroso, J. Watson, T. Nguyen, et al., “Toward An Approach to Measuring Software Trust,” in [53] E. Amoroso, C. Taylor, J. Watson,J. Weiss, “A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness,” in [54] H. P. Zhang, F. D. Shu, Y. Yang, X. Wang,Q. Wang, “A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes,” in [55] J. Du, Y. Yang, Q. Wang,M. S. Li, “Evidence-based Trustworthy Software Process Assessment Method,” [56] B. H. Yu, Q. Wang,Y. Yang, “The Trustworthiness Metric Model of Software Process Quality based-on Life Circle,” in [57] B. H. Yu, Q. Wang,Y. Yang, “The Study of Trustworthy Software Process Improvement Model,” in [58] G. H. Shen, Z. Q. Huang, B. Xie, Y. Q. Zhu, L. L. Liao, F. Wang et al., “Survey on Software Trustworthiness Evaluation,” [59] J. Zhou, M. X. Zhang, “Survey on Trustworthy Software Evaluation,” [60] V. Bianco, L. Lavazza, S. Morasca,D. Taibi, “A Survey on Open Source Software Trustworthiness,” [61] J. P. Li, M. L. Li, D. H. Wu,H. Song, “An Integrated Risk Measurement and Optimization Model for Trustworthy Software Process Management,” [62] G. N. Si, Y. H. Ren, J. Xu,J. F. Yang, “A Dependability Evaluation Model for Internetware based on Bayesian Network,” [63] H. Q.Liang and W. Wu, “Research of Trust Evaluation Model based on Dynamic Bayesian Network,” [64] Y. L. Sun, W. Yu, Z. Han,K. J. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” |
No related articles found! |
|