Int J Performability Eng ›› 2019, Vol. 15 ›› Issue (9): 2364-2372.doi: 10.23940/ijpe.19.09.p9.23642372
Previous Articles Next Articles
Hongwei Taoa, Yixiang Chenb, Hengyang Wuc,*, and Rumei Dengb
Submitted on
;
Revised on
;
Accepted on
Contact:
*.E-mail address: wuhengy_1974@aliyun.com
Hongwei Tao, Yixiang Chen, Hengyang Wu, and Rumei Deng. A Survey of Software Trustworthiness Measurements [J]. Int J Performability Eng, 2019, 15(9): 2364-2372.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
1. J. F. He, Z. G. Shan, J. Wang, G. G. Pu, Y. F. Fang, K. Liu, et al., “Review of the Achievements of Major Research Plan on Trustworthy Software,” 2. S. B. Cai, Y. Z. Zou, L. S. Shao, B. Xie,W. Z. Shao, “Framework Supporting Software Assets Evaluation on Trustworthiness,” 3. S. L. Yang, S. Ding,W. Chu, “Trustworthy Software Evaluation using Utility based Evidence Theory,” 4. A. Avizienis, J. C. Laprie, B. Randell,C. Landwehr, “Basic Concepts and Taxonomy of Dependable and Secure Computing,” 5. National Science and Technology Council, “Research Challenges in High Confidence Systems,” in 6. H. W. Chen, J. Wang,W. Dong, “High Confidence Software Engineering Technologies,” 7. F. B. Schneider, “Trust in Cyberspace,” National Academy Press, Washington, 1998 8. S. Becker, W. Hasselbring, A. Paul, M. Boskovic, H. Koziolek, J. Ploski, et al., “Trustworthy Software Systems: A Discussion of Basic Concepts and Terminology,” 9. B. Lang, X. D. Liu, H. M. Wang, B. Xie,X. G. Mao, “A Classification Model for Software Trustworthiness,” 10. H. W.Tao and Y. X. Chen, “A Quantitative Relation Model Between Trustworthy Attributes,” in 11. P. Oman and J. Hagemeister, “Metrics for Assessing a Software System Maintainability,” in 12. P. Oman and J. Hagemeister, “Construction and Testing of Polynomials Predicting Software Maintainability,” 13. K. Yiannis, H. Ilja, T. Christos,V. Joost, “Interpretation of Source Code Clusters in Terms of the ISO/IEC-9126 Maintainability Characteristics,” in 14. Y. M.Liu and I. Traore, “Properties for Security Measures of Software Products,” 15. C. Y. Huang, M. R. Lyu,S. Y. Kuo, “A Unified Scheme of Some Nonhomogeneous Poisson Process Models for Software Reliability Estimation,” 16. B. H. Wang, Y. X. Chen, S. Zhang,H. Y. Wu, “Updating Model of Software Component Trustworthiness based on Users Feedback”, 17. G. H. Shen, Z. Q. Huang, B. Xie, Y. Q. Zhu, L. L. Liao, F. Wang, et al., “Survey on Software Trustworthiness Evaluation,” 18. L. Gu, Y. Guo, H. Wang, Y. Z. Zou, B. Xie,W. Z. Shao, “Runtime Software Trustworthiness Evidence Collection Mechanism based on TPM,” 19. L. Tan, J. Chen,M. T. Zhou, “Trustworthiness Evidence Collection Mechanism of Running Dynamic Environment of Trusted Terminal,” 20. L. Yuan, H. M. Wang, G. Yin, D. X. Shi,H. B. Mi, “Trustworthy Evaluation Technology of Software based on Roles,” 21. L. Yuan, H. M. Wang, G. Yin, D. X. Shi,Y. X. Zhu, “An Automatic Evaluation Evidence Framework for Open Source Software,” 22. G. H. Shen, Z. Q. Huang, J. Qian, Y. J. Xu, J. Hao, W. Y. Zhao, et al., “Research on Software Trustworthiness Evaluation Model and Its Implementation,” 23. G. Y.Shi and Y. F. Fu, “Establishing Evidence Model based on Multiple Attributes of Trustworthiness,” 24. X. L. Ding, H. M. Wang, Y. Y. Wang,G. Lu, “Verification Oriented Trustworthiness Evidence and Trustworthiness Evaluation of Software,” 25. G. Lu, H. M. Wang,X. G. Mao, “A Cognitive-based Evidence Model for Software Trustworthiness Evaluation,” 26. H. L. Shi, J. Ma,F. Y. Zou, “A Fuzzy Comprehensive Evaluation Model for Software Dependability based on Entropy Weight,” in 27. B. Li and Y. Cao, “An Improved Comprehensive Evaluation Model of Software Dependability based on Rough Set Theory,” 28. L. Shi, S. L. Yang, K. Li,B. G. Yu, “Developing an Evaluation Approach for Software Trustworthiness using Combination Weights and TOPSIS,” 29. S. Ding, S. L. Yang,C. Fu, “A Novel Evidential Reasoning based Method for Software Trustworthiness Evaluation under the Uncertain and Unreliable Environment,” 30. B. Wang, X. S. Zhou,Y. L. Yang, “An Entropy-Weighted Multi-Attribute Combination Method for Software Trustworthiness Classification Assessment,” 31. Z. M. Zheng, S. L. Ma, W. Li, X. Jiang, W. Wei, L. L. Ma, et al., “Complexity of Software Trustworthiness and Its Dynamical Statistical Analysis Methods,” 32. X. Zhang, W. Li, Z. M. Zheng,B. H. Guo, “Optimized Statistical Analysis of Software Trustworthiness Attributes,” 33. H. W. Tao, “Research on the Measurement Models of Software Trustworthiness based on Attributes,” Ph. D. Dissertation, East China Normal University, Shanghai, China, 2011 34. H. W.Tao and Y. X. Chen, “A New Metric Model for Trustworthiness of Softwares,” 35. D. Taibi, “Towards a Trustworthiness Model for Open Source Software,” Ph. D. Dissertation, University of Insubria, Lombardy, 2010 36. G. N. Si, Y. H. Ren, J. Xu,J. F. Yang, “A Dependability Evaluation Model for Internetware based on Bayesian Network,” 37. H. Q. Wang, H. W. Lv, Q. Zhao, X. K. Dong,G. S. Feng, “Model and Quantification of Autonomic Dependability of Mission-Critical Systems,” 38. L. Chen, P. Cheng,W. Liu, “The Model and Method of Trustworthiness Level Evaluation for Software Product,” in 39. S. A. Hofmeyr, S. Forrest,A. Somayaji, “Intrusion Detection using Sequences of System Calls,” 40. R. Sekar, M. Bendre, D. Dhurjati,P. Bollineni, “A Fast Automaton-based Method for Detecting Anomalous Program Behaviors,” in 41. P. Li, H. Park, D. B. Gao,J. M. Fu, “Bridging the Gap Between Data-Flow and Control-Flow Analysis for Anomaly Detection,” in 42. D. Wagner and D. Dean, “Intrusion Detection via Static Analysis,” in 43. H. H. Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee,B. P. Miller, “Formalizing Sensitivity in Static Analysis for Intrusion Detection,” in 44. J. F. Tian, Z. Li,Y. L. Liu, “A Design Approach of Trustworthy Software and Its Trustworthiness Evaluation,” 45. J. F. Tian, J. E. Han, R. Z. Du,Y. Wang, “Creditability Evaluation Model based on Software Behavior Trace,” 46. M. Nami and W. Suryn, “From Requirements to Software Trustworthiness using Scenarios and Finite State Machine,” in 47. L. Zhuang, C. X. Shen,M. Cai, “Research on State Space Reduction of Behavior-based Trusted Dynamic Measurement,” 48. N. Fu, X. S. Zhou,T. Zhan, “QPi: A Calculus to Enforce Trustworthiness Requirements,” 49. D. Wang, H. Y. Sun, J. Wang,L. H. Fu, “Trusted Analysis Model for Interactive Behavior of a Software System based on Slicing Technology,” 50. Y. L. Liu, R. Z. Du, J. L. Feng,J. F. Tian, “Trust Model Of Software Behaviors based On Check Point Risk Assessment,” 51. Y. Y.Yuan and Q. Han, “A Software Behavior Trustworthiness Measurement Method based on Data Mining,” 52. J. Du, “Research on Software Process-Oriented Trustworthiness Evidence Model and Process Trustworthiness Evaluation Method,” Ph. D. Dissertation, University of Chinese Academy of Sciences, Beijing, China, 2012 53. E. Amoroso, T. Nguyen, J. Weiss, J. Watson, P. Lapiska,T. Starr, “Toward an Approach to Measuring Software Trust,” in 54. Y. Yang, Q. Wang,M. S. Li, “Process Trustworthiness as a Capability Indicator for Measuring and Improving Software Trustworthiness,” in 55. J. Z. Zhan, “Influences and Control of Distrustable Factor on Software Trustworthiness,” Ph. D. Dissertation, Nanjing University, Nanjing, China, 2011 56. W. X. Zhang, W. H. Liu,X. Wu, “Quantitative Evaluation Across Software Development Life Cycle based on Data Fusion,” 57. H. B. Qian, X. J. Zhu,M. Z. Jin, “Research on Testing-based Software Credibility Measurement and Assessment,” in 58. H. W.Tao and Y. X. Chen, “A Survey of Software Trustworthiness Measurement Validation”, 59. J. Wang, Y. X. Chen, B. Gu, X. Y. Guo, B. H. Wang, S. Y. Jin, et al., “An Approach to Measuring and Grading Software Trust for Spacecraft Software,” 60. H. W.Tao and J. Zhao, “Source Codes Oriented Software Trustworthiness Measure based on Validation,” |
[1] | Jiamei Niu, Xuan Zhang, Ziqi Tang, Jingzhuan Zhao. System Dynamics Simulation of Global Software Development Process [J]. Int J Performability Eng, 2020, 16(2): 171-184. |
[2] | Mengyue Wang, Yanfang Ma, Haiyu Pan, Hongwei Tao, and Liang Chen. Trade-off Costs of Software Trustworthy Attributes [J]. Int J Performability Eng, 2019, 15(9): 2422-2431. |
[3] | Rumei Deng, Yixiang Chen, Hengyang Wu, and Hongwei Tao. Software Trustworthiness Evaluation using Structural Equation Modeling [J]. Int J Performability Eng, 2019, 15(10): 2628-2635. |
[4] | Hongwei Tao and Yixiang Chen. A Survey of Software Trustworthiness Measurement Validation [J]. Int J Performability Eng, 2018, 14(9): 2056-2065. |
|