Abstract
Making informed choices when designing or contracting a system is yet a very challenging task. One of the biggest users’ concern is to select the most trustworthy solution. However, it is difficult to understand the trustworthiness of a system, because it encompasses a large diversity of properties such as security, privacy, performance, among others. Composing a measure that considers such a large number of properties, the relationship among them and their relevance in the composition requires a well defined model, such as a quality model. In this experience report, we study whether quality models can provide scores that are useful to characterize those properties, helping users to choose the most trustworthy of the available alternatives. Then, we have chosen a property that is on the top of users concerns: data privacy. Results showed a higher percentage of success of linkage attacks when the privacy score is lower, indicating the usefulness of quality models in measuring and improving data privacy and providing interesting insights to the users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Basso, T., Matsunaga, R., Moraes, R., Antunes, N.: Challenges on anonymity, privacy, and big data. In: 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), pp. 164–171. IEEE (2016)
Dujmovic, J., Elnicki, R.: A DMS cost/benefit decision model: mathematical models for data management system evaluation, comparison, and selection, pp. 82–374. National Bureau of Standards, Washington DC, No. GCR (1982)
Friginal, J., MartĂnez, M., de Andres, D., Ruiz, J.C.: Multi-criteria analysis of measures in benchmarking: dependability benchmarking as a case study. J. Syst. Softw. 111, 105–118 (2016)
Henschke, A., Ford, S.B.: Cybersecurity, trustworthiness and resilient systems: guiding values for policy. J. Cyber Policy 2(1), 82–95 (2017)
ISO/IEC: Software product quality requirements and evaluation - SQUARE. User guide. ISO/IEC (2005)
International Organization for Standardization: When the world agrees (ISO/IEC) (2014). https://www.iso.org/standard/64764.html
Kort, S., Rudina, E.: The resilience model supporting IIoT system trustworthiness. IIC J. Innov. 1(1), 1–16 (2018)
Kreutz, D., Feitosa, E., Cunha, H., Niedermayer, H., Kinkelin, H.: Increasing the resilience and trustworthiness of openid identity providers for future networks and services. In: 2014 Ninth International Conference on Availability, Reliability and Security, pp. 317–324. IEEE (2014)
Medeiros, N.P.D.S., Ivaki, N.R., Da Costa, P.N., Vieira, M.P.A.: Towards an approach for trustworthiness assessment of software as a service. In: 2017 IEEE International Conference on Edge Computing (EDGE), pp. 220–223. IEEE (2017)
Mei, H., Huang, G., Xie, T.: Internetware: a software paradigm for internet computing. Computer 45(6), 26–31 (2012)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Acknowledgment
This work has been partially supported by the ATMOSPHERE project, funded by Brazilian MCTI/RNP and by the European Commission under the Horizon 2020 grant agreement.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Basso, T., Silva, H., Moraes, R. (2019). On the Use of Quality Models to Characterize Trustworthiness Properties. In: Calinescu, R., Di Giandomenico, F. (eds) Software Engineering for Resilient Systems. SERENE 2019. Lecture Notes in Computer Science(), vol 11732. Springer, Cham. https://doi.org/10.1007/978-3-030-30856-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-30856-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30855-1
Online ISBN: 978-3-030-30856-8
eBook Packages: Computer ScienceComputer Science (R0)