Trust Model of Software Behaviors Based on Check Point Risk Evaluation

In order to evaluate the credibility of software behaviors more reasonably and accurately, a trust model of software behaviors based on check point risk evaluation is presented. Firstly, adopt fuzzy analytic hierarchy process (FAHP) to figure out the weight of every risk factor of check point, meanwhile, assess the modules value according to Markov Chain Usage Model, thus calculating out the risk value of check point and accumulating every suspected risk check point, and then adopt rewarding or punishment mechanism to evaluate a software behaviors trustworthy, which can judge whether software behaviors are credible or not. The simulated experiment shows that this model can distinguish the potential risk effectively in software behaviors, evaluate the risk value trustworthy and provide objective and reliable information to judge whether software behaviors are credible or not.

[1]  Wang Yue-sheng Model of fuzzy risk assessment of the information system , 2007 .

[2]  Svein J. Knapskog,et al.  Belief-Based Risk Analysis , 2004, ACSW.

[3]  Wang Ji,et al.  High Confidence Software Engineering Technologies , 2003 .

[4]  Thomas L. Saaty What is the analytic hierarchy process , 1988 .

[5]  Jun Li,et al.  Monitoring and characterization of component-based systems with global causality capture , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[6]  Marten van Sinderen,et al.  Monitoring of Distributed Component Interactions , 2000 .

[7]  Robert A. Olsen Trust as risk and the foundation of investment value , 2008 .

[8]  Grigore Rosu,et al.  Mop: an efficient and generic runtime verification framework , 2007, OOPSLA.

[9]  P. Ring,et al.  Developmental Processes of Cooperative Interorganizational Relationships , 1994 .

[10]  Audun Jøsang,et al.  Analysing the Relationship between Risk and Trust , 2004, iTrust.

[11]  Yang Shanlin,et al.  Comparative Study on Several Scales in AHP , 2004 .

[12]  J. H. Davis,et al.  An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .

[13]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[14]  Zhang Run A Trust Model Based on Behaviors Risk Evaluation , 2009 .

[15]  Jiawei Han,et al.  Classification of software behaviors for failure detection: a discriminative pattern mining approach , 2009, KDD.

[16]  Leonardo Mariani,et al.  A Technique for Verifying Component-Based Software , 2005, Electron. Notes Theor. Comput. Sci..

[17]  Tang Yang-bin,et al.  Trustworthiness of Internet-based software , 2006 .