Abstract
This paper presents a congruence measurement method by partitions to apply software trustworthiness measures in dynamic behavior feature datasets. The datasets are generated at software running time. And the method compares the datasets with the static attribute feature datasets generated at software testing time. So this method can make recommendations for users in services selection time under the environment of SaaS. The measurement method is carried out in three stages: firstly, defining the concept of trust, software trustworthiness, static and dynamic feature datasets with fundamental calculating criteria; secondly, providing a group of formulas to illustrate congruence measurement approach for comparing the two types of feature datasets; lastly, giving an architecture supported by software trustworthiness measurement algorithm to evaluate conceptualized hierarchical software trustworthiness.
Article PDF
Explore related subjects
Find the latest articles, discoveries, and news in related topics.Avoid common mistakes on your manuscript.
References
V. G. Cerf, Trust and the Internet, IEEE Internet Computing. 14(5) (2010) 95–96.
G. Pallis, Cloud Computing: The New Frontier of Internet Computing, IEEE Internet Computing. 14(5) (2010) 70–73.
M. Cusumano, Cloud Computing and SaaS as New Computing Platforms, Communications of the ACM. 53(4) (2010) 27–29.
D. R. Wallace and R. U. Fujii, Software Verification and Validation: An Overview, IEEE Software, 6(3) (1989) 10–17.
R. R. Yager, Some Measures Relating Partitions Useful For Computational Intelligence, International Journal of Computational Intelligence Systems. 1(1) (2008) 1–18.
L. Liu and W. Shi, Trust and Reputation Management, IEEE Internet Computing. 14(5) (2010) 10–13.
A. S. Patrick, Building Trustworthy Software Agents, IEEE Internet Computing. 6(6) (2002) 46–53
R. S. Pressman, Software Engineering: A Practitioner Approach (McGraw-Hill International, 6th edition, 2006).
R. Sandhu, The Technology of Trust, IEEE Internet Computing. 6(6) (2002) 28–29.
H. Wang, Y. Tang, G. Yin and L. Li, Trustoworthiness of Internet-based software, Science in China Series F: Information Sciences, 49(6) (2006) 759–773.
S. P. Marsh, Formalising Trust as a Computational Concept, doctoral thesis, University of Stirling, Scotland, 1994.
N. Limam and R. Boutaba, Assessing Software Service Quality and Trustworthiness at Selection Time, IEEE Transactions on Software Engineering. 36(4) (2010) 559–574.
H. Chen, J. Wang and W. Dong, High Confidence Software Engineering Technologies, Acta Electronic Sinca, 31(12A) (2003) 1933–1938. (in Chinese with English abstract).
B. Fang, T. Lu and C. Li, Survey of software assurance, Journal on Communications, 30(2) (2009) 106–117. (in Chinese with English abstract).
K. Liu, Z. Shan, J. Wang, J. He, Z. Zhang and Y. Qin, Overview on Major Research Plan of Trustworthy Software, Bulletin of National Science Foundation of China, 22(3) (2008) 145–151. (in Chinese with English abstract).
Y. Qu, Software Behavior (Publish House of Electronics Industry, Beijing, CN, 2004). (in Chinese)
H. Mei, Q. Wang, L. Zhang and J. Wang, Software Analysis: A Road Map, Chinese Journal of Computers. 32(9) (2009) 1697–1710. (in Chinese with English abstract).
C. Shen, H. zhang, H. Wang, J. Wang, B. Zhao, F. Yan, F. Yu, L. Zhang and M. Xu, Research and Development of Trusted Computing, Sci. China Ser F-inf Sci, 40(2) (2010) 139–166. (in Chinese).
Y. Yuan, S. Witold and J. Boegh, Research on Key Technologies of Software Trustworthiness (Publish House of Electronics Industry, Beijing, CN, 2010).
L. Zhang and J. Zhang, Architecture-Driven Variation Analysis for Designing Cloud Applications, in Proc. Int. Conf. Cloud Computing, eds. L. Zhang (Bangalore, India, 2009), 125–134.
L. Zhang, J. Zhang and H. Cai, Services Computing (Tsinghua University Press and Springer, Beijing, CN, 2007).
R. J. Hall, Editorial: data mining in software engineering, Automated Software Engineering, 17(4) (2010), 373–374.
A. Garcia-Crespo, R. Colomo-Palacios, J. M. Gomez-Berbis and M. Mencke, BMR: Benchmarking Metrics Recommender for Personnel issues in Software Development Projects, International Journal of Computational Intelligence Systems. 2(3) (2009) 256–266.
G. Gay, T. Menzies, M. Davies and K. Gundy-Burlet, Automatically finding the control variables for complex system behavior, Automated Software Engineering, 17(4) (2010), 439–468.
J. Huang and D. M. Nicol, A Formal-Semantics-Based Calculus of Trust, IEEE Internet Computing. 14(5) (2010) 38–46.
J. Huang and D. M. Nicol, A Calculus of Trust and Its Application to PKI and Identity Management, in Proc. 8th Symp. Identity and Trust on the Internet, eds. K. Seamons (Gaithersburg, MD, 2009)
K. Hwang and D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing. 14(5) (2010) 14–22.
J. Zhan, X. Zhou and J. Zhao, Analysis of the Original Cause of Software Distrust, in Proc. 2nd Int. Conf. Software Engineering and Data Mining, eds. G. Kou, Y. Peng, F. I. S. Ko, Y. Chen, T. Tateyama (Chengdu, China, 2010), pp. 240–245.
X. Fang, C. Jiang and X. Fan, Behavior-aware Trustworthiness Study of Networked Software, International Journal of Computational Intelligence Systems. 3(5) (2010) 542–552.
J. Zeng, H. Sun, X. Liu, T. Deng and J. Huai, Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition, Journal of Software. 21(2) (2010) 261–276. (in Chinese with English abstract).
Y. Liu, Z. Ma, X. He and W. Shao, Approach to Transforming UML Model to Reliability Analysis Model, Journal of Software. 21(2) (2010) 287–304. (in Chinese with English abstract).
S. Cai, Y. Zou, L. Shao, B. Xie and W. Shao, Framework Supporting Software Assets Evaluation on Trustworthiness, Journal of Software. 21(2) (2010) 359–372. (in Chinese with English abstract).
L. Gu, Y. Guo, H. Wang, Y. Zou, B. Xie and W. Shao, Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM, Journal of Software. 21(2) (2010) 373–387. (in Chinese with English abstract).
T. Bao, S. Liu and X. Wang, Research on Trustworthiness Evaluation Method for Domain Software Based on Actual Evidence, Chinese Journal of Electronics. 20(2) (2011) pp195–199.
J. Pan, F. Xu, J. Lu, Reputation-Based Recommender Discovery Approach for Service Selection, Journal of Software. 21(2) (2010) 388–400. (in Chinese with English abstract).
Z. Zheng, S. Ma, W. Li, X. Jiang, Z. Zhang and B. Guo, Dynamical characteristic of software trustworthiness and their evolutionary complexity, Science in China Series F: Information Sciences, 52(8) (2009) 1328–1334.
Z. Zheng, S. Ma, W. Li, X. Jiang, W. Wei, L. Ma and S. Tang, Complexity of software trustworthiness and its dynamical statistical analysis methods, Science in China Series F: Information Sciences, 52(9) (2009) 1651–1657.
W. Wang and G. Zeng, Trusted dynamical level scheduling based on Bayes trust model, Science in China Series F: Information Sciences, 50(3) (2007) 456–469.
B. Lang, A computational trust model for access control in P2P, Science in China Series F: Information Sciences, 53(5) (2010) 896–910.
R. Zhu, Research on Key Technologies for Trustworthy Service Composition, doctoral thesis, National University of Defense Technology, China, 2009.
H. Hu, Research on Distributed Access Control Based on Trusted Computing, doctoral thesis, University of Science and Technology of China, China, 2009.
Y. Zhang, H. Chen, X. Jiang, H. Sheng and Z. Wu, RCCtrust: A Combined Trust Model for Electronic Community, Journal of Computer Science and Technology, 24(5) (2009) 883–892.
X. Feng, J. Pan and W. Lu, A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments, Journal of Computer Science and Technology, 24(2) (2009) 373–385.
National University of Defense Technology, Peking University, Beihang University and CVICSE, http://www.trustie.net.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (https://doi.org/creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Yuan, Y., Han, Q. A Software Behavior Trustworthiness Measurement Method based on Data Mining. Int J Comput Intell Syst 4, 817–825 (2011). https://doi.org/10.2991/ijcis.2011.4.5.8
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijcis.2011.4.5.8