A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes
Abstract
:1. Introduction
2. Materials and Methods
2.1. Reallocating Procedure
2.2. Software Trustworthiness Measurement Model
- 1.
- T is the trustworthy degree of software;
- 2.
- n is the number of trustworthy attributes;
- 3.
- is the value of the trustworthy attribute such that , of which is the specified value that all of the trustworthy attributes must reach;
- 4.
- is the weight value of theattribute, with,.
2.3. Reallocation Model for Software Trustworthiness
- 1.
- T is the trustworthy degree of software after reallocation;
- 2.
- is the new trustworthy degree that the software must achieve after reallocation;
- 3.
- n is the number of trustworthy attributes;
- 4.
- are the trustworthy attribute values after reallocation;
- 5.
- are the trustworthy attribute values before reallocation;
- 6.
- is the new value that all of the trustworthy attributes must reach after reallocation;
- 7.
- is the increased value of theattribute after reallocation;
- 8.
- is the weight value of theattribute, with,.
- 1.
- n is the number of trustworthy attributes;
- 2.
- are the trustworthy attribute values after reallocation;
- 3.
- are the trustworthy attribute values before reallocation;
- 4.
- is the new value that all of the trustworthy attributes must reach after reallocation;
- 5.
- is the weight value of theattribute with,,;
- 6.
- k is the growth rate of the trustworthy attribute value, which follows.
- 1.
- k is the growth rate of the trustworthy attribute value, which follows;
- 2.
- n is the number of trustworthy attributes;
- 3.
- is the new value that all of the trustworthy attributes must reach after reallocation, of which;
- 4.
- are the trustworthy attribute values before reallocation such that;
- 5.
- is the weight value of theattribute with,,;
- 6.
- is the new trustworthy degree that the software must achieve after reallocation.
2.4. Reallocation Algorithm for Software Trustworthiness
- Since for , , and , then for any , it follows that
- (1)
- For , notice that and , then for any , we can derive
- (2)
- For , since and , then from the inequality , we have
- When , it is easy to prove that is the optimal solution, and all of the trustworthy attribute values after the reallocation are equal to .
- When ,
- (1)
- if , it is easy to show that is the optimal solution, and all of the trustworthy attribute values after the reallocation are equal to too.
- (2)
- if , letTaking as the initial value of the iteration, Newton iteration method is used to find the approximate root k that satisfies . If , then the trustworthy attribute values are calculated by substituting k into the trustworthy attribute value growth function. For different , and , k solved by Newton iteration method satisfying may be out of the above range. In this case, bringing k into the trustworthy attribute value growth function will cause some trustworthy attribute values to exceed 10. To solve this problem, is modified to
Algorithm 1 Algorithm for reallocating software trustworthiness: for given trustworthy attribute values before reallocation, trustworthy attribute weight values , that the software must achieve after reallocation and that all of the trustworthy attributes must reach after reallocation, output the reallocated trustworthy attribute values |
|
2.5. Example of Software Trustworthiness Reallocation
3. Discussion
4. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- He, J.F.; Shan, Z.G.; Wang, J.; Pu, G.G.; Fang, Y.F.; Liu, K.; Zhao, R.Z.; Zhang, Z.T. Review of the Achievements of Major Research Plan of Trustworthy Software. Bull. Natl. Nat. Sci. Found. China 2018, 32, 291–296. [Google Scholar] [CrossRef]
- Fenton, N.; Littlewood, B.; Neil, M.; Strigini, L.; Sutclife, A.; Wright, D. Assessing Dependability of Safety Critical Systems Using Diverse Evidence. IEEE Proc. Softw. 1998, 145, 35–39. [Google Scholar] [CrossRef] [Green Version]
- Steffen, B.; Wilhelm, H.; Alexandra, P.; Marko, B.; Heiko, K.; Jan, P.; Abhishek, D.; Henrik, L.; Matthias, R.; Daniel, W.; et al. Trustworthy Software Systems: A Discussion of Basic Concepts and Terminology. ACM SIGSOFT Softw. Eng. Notes 2006, 31, 1–18. [Google Scholar] [CrossRef]
- Hasselbring, W.; Reussner, R. Toward Trustworthy Software Systems. IEEE Trans. Comput. 2006, 39, 91–92. [Google Scholar] [CrossRef]
- Bianco, V.D.; Lavazza, L.; Morasca, S.; Taibi, D. A Survey On Open Source Sofware Trustworthiness. IEEE Sofw. 2011, 28, 67–75. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X. A Survey of Software Trustworthiness Measurement Validation. Int. J. Perform. Eng. 2018, 14, 2056–2065. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X.; Wu, H.Y.; Deng, R.M. A Survey of Software Trustworthiness Measurements. Int. J. Perform. Eng. 2019, 15, 2364–2372. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X. A Metric Model For Trustworthiness of Softwares. In Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Milan, Italy, 15–18 September 2009; pp. 69–72. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X. A New Metric Model for Trustworthiness of Softwares. Telecommun. Syst. 2012, 51, 95–105. [Google Scholar] [CrossRef]
- Zhang, L.W.; Chen, Y.X.; Zhou, Y.; Zhang, M.; Zhang, J.Y. Stability of Software Trustworthiness Measurements Models. In Proceedings of the IEEE 7th International Conference on Software Security and Reliability Companion, Gaithersburg, MD, USA, 18–20 June 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X.; Pang, J.M. Axiomatic Approaches Based Software Trustworthiness Measures. In Proceedings of the International Conference on Applied System Innovation (ICASI 2015), Osaka, Japan, 22–26 May 2015; pp. 135–142. [Google Scholar] [CrossRef]
- Tao, H.W.; Zhou, J. An Improved Attribute-Based Software Trustworthiness Metric Model. J. Wuhan Univ. (Nat. Sci. Ed.) 2017, 63, 151–157. [Google Scholar] [CrossRef]
- Tao, H.W.; Chen, Y.X. A Software Trustworthiness Measure Based on the Decompositions of Trustworthy Attributes and its Validation. In Proceedings of the Industrial Engineering, Management Science and Applications 2015, Tokyo, Japan, 26–28 May 2015; pp. 981–990. [Google Scholar] [CrossRef]
- Wang, J.; Chen, Y.X.; Gu, B.; Guo, X.Y.; Wang, B.H.; Jin, S.Y.; Xu, J.; Zhang, J.Y. An Approach to Measuring and Grading Software Trust for Spacecraft Software. Sci. Sin. Technol. 2015, 45, 221–228. [Google Scholar] [CrossRef]
- Ding, S.; Yang, S.L.; Fu, C. A Novel Evidential Reasoning Based Method for Software Trustworthiness Evaluation Under the Uncertain and Unreliable Environment. Exp. Syst. Appl. 2012, 39, 2700–2709. [Google Scholar] [CrossRef]
- Hauke, S.; Biedermann, S.; Muhlhauser, M.; Heider, D. On the Application of Supervised Machine Learning to Trustworthiness Assessment. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, 16–18 July 2013; pp. 525–534. [Google Scholar] [CrossRef]
- Muhammad, D.M.S.; Fairul, R.F.; Loo, F.A.; Nur, F.A.; Norzamzarini, B. Rating of Software Trustworthiness Via Scoring of System Testing Results. Int. J. Dig. Enterp. Technol. 2018, 1, 121–134. [Google Scholar] [CrossRef]
- Yang, X.; Jabeen, G.; Luo, P.; Zhu, X.L.; Liu, M.H. A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework. J. Comput. Sci. Technol. 2018, 33, 603–620. [Google Scholar] [CrossRef]
- Wang, H.M. Harnessing the Crowd Wisdom for Software Trustworthiness: Practices in China. ACM SIGSOFT Softw. Eng. Notes 2018, 43, 6–11. [Google Scholar] [CrossRef]
- Cho, J.H.; Xu, S.H.; Hurley, P.M.; Mackay, M.; Benjamin, T.; Beaumont, M. STRAM: Measuring the Trustworthiness of Computer-Based Systems. ACM Comput. Surv. 2019, 51, 1–47. [Google Scholar] [CrossRef]
- Davide, T. Towards a Trustworthiness Model for Open Source Software. Ph.D. Thesis, University of Insubria, Lombardy, ON, Canada, 2010. [Google Scholar]
- Vieri, D.B.; Luigi, L.; Sandro, M.; Davide, T. Quality of Open Source Software: The Qualipso Trustworthiness Model. In Proceedings of the 5th IFIP WG 2.13 International Conference on Open Source Systems (OSS 2009), Skövde, Sweden, 3–6 June 2009; pp. 199–212. [Google Scholar] [CrossRef] [Green Version]
- Han, Q. Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy. Entropy 2018, 20, 195. [Google Scholar] [CrossRef] [Green Version]
- Jiang, R. A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy 2014, 16, 4818–4838. [Google Scholar] [CrossRef] [Green Version]
- Gene, M.A.; Tyler, J.R. Trustworthiness Perceptions of Computer Code: A Heuristic-Systematic Processing Model. In Proceedings of the 51st Hawaii International Conference on System Sciences, Waikoloa Village, HI, USA, 3–6 January 2018; pp. 5384–5393. [Google Scholar] [CrossRef] [Green Version]
- Wang, B.H.; Chen, Y.X.; Zhang, S.; Wu, H.Y. Updating Model of Software Component Trustworthiness Based on Users Feedback. IEEE Acess 2019, 7, 60199–60205. [Google Scholar] [CrossRef]
- Ma, Y.J.; Chen, Y.X.; Gu, B. An Attributes-Based Allocation Approach of Software Trustworthy Degrees. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security Companion, Vancouver, BC, Canada, 3–5 August 2015; pp. 89–94. [Google Scholar] [CrossRef]
- Tao, H.W.; Wu, H.Y.; Chen, Y.X. An Approach of Trustworthy Measurement Allocation Based on Sub-Attributes of Software. Mathematics 2019, 7, 237. [Google Scholar] [CrossRef] [Green Version]
- International Organization for Standardization (ISO). ISO/IEC DIS 30754 Information Technology–Software Trustworthiness–Governance and Management–Specification; ISO: Geneva, Switzerland, 2016. [Google Scholar]
Rank | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
No. 2 | 8.28 | 7.61 | 6.13 | 8.26 | 8.28 | 8.37 | 9.00 | 9.00 | 9.65 | 7.90 | III |
No. 4 | 7.66 | 7.61 | 4.76 | 7.61 | 8.26 | 8.37 | 9.00 | 4.24 | 9.37 | 7.09 | II |
No. 6 | 7.66 | 7.87 | 5.90 | 7.00 | 8.26 | 8.37 | 7.00 | 7.00 | 9.65 | 7.36 | III |
No. 7 | 7.66 | 7.87 | 6.15 | 4.63 | 8.26 | 8.37 | 7.62 | 7.00 | 9.65 | 7.04 | III |
No. 9 | 7.66 | 7.87 | 7.94 | 7.00 | 8.26 | 7.93 | 8.28 | 7.94 | 9.64 | 7.97 | III |
No. 18 | 8.33 | 7.61 | 8.41 | 9.00 | 8.28 | 9.49 | 10.00 | 9.00 | 8.26 | 8.61 | IV |
No. 19 | 8.33 | 7.61 | 9.16 | 8.28 | 8.26 | 8.37 | 9.66 | 9.00 | 9.00 | 8.58 | IV |
No. 20 | 7.00 | 7.61 | 8.28 | 7.61 | 7.61 | 8.37 | 8.59 | 9.49 | 9.00 | 8.08 | III |
No. 21 | 8.33 | 7.87 | 8.20 | 7.00 | 9.00 | 8.37 | 8.59 | 9.00 | 8.56 | 8.17 | III |
No. 22 | 8.33 | 7.87 | 5.99 | 7.00 | 9.00 | 8.37 | 8.59 | 9.00 | 10.00 | 7.76 | III |
No. 23 | 9.00 | 7.61 | 8.40 | 9.00 | 8.58 | 8.37 | 10.00 | 9.00 | 8.26 | 8.57 | IV |
Rank V | Rank IV | Rank III | Rank II | Rank I | |
---|---|---|---|---|---|
Lowest trustworthy degree of software | 9.50 | 8.50 | 7.00 | 4.50 | 0.00 |
Lowest trustworthy value of software attribute | 8.50 | 7.00 | 4.50 | 0.00 | 0.00 |
No. 4 | |
---|---|
No. 2 | No. 6 | No. 7 | No. 9 | No. 20 | No. 21 | No. 22 | |
---|---|---|---|---|---|---|---|
3.23 | 6.89 | 8.35 | 3.53 | 2.74 | 2.28 | 4.01 |
No. 18 | No. 19 | No. 23 | |
---|---|---|---|
5.84 | 6.31 | 5.95 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tao, H.; Chen, Y.; Wu, H. A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes. Mathematics 2020, 8, 14. https://doi.org/10.3390/math8010014
Tao H, Chen Y, Wu H. A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes. Mathematics. 2020; 8(1):14. https://doi.org/10.3390/math8010014
Chicago/Turabian StyleTao, Hongwei, Yixiang Chen, and Hengyang Wu. 2020. "A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes" Mathematics 8, no. 1: 14. https://doi.org/10.3390/math8010014
APA StyleTao, H., Chen, Y., & Wu, H. (2020). A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes. Mathematics, 8(1), 14. https://doi.org/10.3390/math8010014