Behavior-aware Trustworthiness Study of Networked Software

The essence characteristics of software trustworthiness are software execution effect and behavior can be anticipated, which is an important index of software quality. Under the open and dynamic environments, some uncertainty factors cause the behavior of software to be uncontrolled, uncertainty and unpredictable. Behavioraware networked software trustworthiness research methods are proposed in the paper. Firstly, we propose the analysis methods of the consistency between the inferred specification models with component specification model. Then, for analyzing the component interaction behavior, the behavior relativity analyzing method is presented based on Petri net. Finally, aimed to the outer factors, we analyze the behavioral congruence between theoretical composite models with dynamic behavior model based on running logs. Theoretical analysis and the example analysis indicated that this method is benefit to analyze the trustworthiness of networked software.

[1]  Li Zhou,et al.  Negotiation-Enabled Modeling and Verification of Architectural Behavior of Internetware: Negotiation-Enabled Modeling and Verification of Architectural Behavior of Internetware , 2008 .

[2]  Roger Tagg,et al.  Intelligent Concepts for the Management of Information in Workflow Systems , 2009 .

[3]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[4]  Zhou Li,et al.  Negotiation-Enabled Modeling and Verification of Architectural Behavior of Internetware , 2008 .

[5]  Gerard J. Holzmann,et al.  The SPIN Model Checker , 2003 .

[6]  Roger Tagg,et al.  Intelligent Concepts for the Management of Information in Workflow Systems , 2009, Int. J. Comput. Intell. Syst..

[7]  Howard Barringer,et al.  Learning to Divide and Conquer , 2007 .

[8]  Doreswamy,et al.  Similarity Measuring Approach for Engineering Materials Selection , 2010 .

[9]  W. Marsden I and J , 2012 .

[10]  MuDer Jeng,et al.  Deadlock prevention policy based on Petri nets and siphons , 2001 .

[11]  Manuvir Das,et al.  Perracotta: mining temporal API rules from imperfect traces , 2006, ICSE.

[12]  Wil M. P. van der Aalst,et al.  Conformance checking of service behavior , 2008, TOIT.

[13]  Pavol Cerný,et al.  Synthesis of interface specifications for Java classes , 2005, POPL '05.

[14]  Altug Iftar,et al.  Deadlock Avoidance Controller Design for Timed Petri Nets Using Stretching , 2008, IEEE Systems Journal.

[15]  Eran Yahav,et al.  Effective typestate verification in the presence of aliasing , 2006, TSEM.

[16]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[17]  Eran Yahav,et al.  Static Specification Mining Using Automata-Based Abstractions , 2008, IEEE Trans. Software Eng..

[18]  Roberto Cordone,et al.  Selective Siphon Control for Deadlock Prevention in Petri Nets , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[19]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[20]  Leonardo Mariani,et al.  Automatic generation of software behavioral models , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[21]  Wang Yibo,et al.  Impacts of permafrost changes on alpine ecosystem in Qinghai-Tibet Plateau , 2006 .