Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach

The Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations without relating them to the requirements of the system’s components. We propose a belief-based trust approach based on an extended version of Secure Tropos, where social relations are modeled and analyzed along with beliefs concerning capabilities and motivations of system’s components. An example concerning US stock market crash (the Flash Crash) is used to illustrate our approach.

[1]  John Mylopoulos,et al.  Reasoning with Goal Models , 2002, ER.

[2]  Paolo Giorgini,et al.  Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.

[3]  Daniel L. Moody,et al.  The “Physics” of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering , 2009, IEEE Transactions on Software Engineering.

[4]  A. Kyle,et al.  The Flash Crash: The Impact of High Frequency Trading on an Electronic Market , 2011 .

[5]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[6]  William A. Wallace,et al.  Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[7]  Nicola Zannone A requirements engineering methodology for trust, security, and privacy , 2007 .

[8]  Fabio Massacci,et al.  From Trust to Dependability through Risk Analysis , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[9]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[10]  Mario Alviano,et al.  The Disjunctive Datalog System DLV , 2010, Datalog.

[11]  John Mylopoulos,et al.  Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures , 2004, EuroPKI.

[12]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[13]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[14]  Anand S. Rao,et al.  Modeling Rational Agents within a BDI-Architecture , 1997, KR.

[15]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[16]  John Mylopoulos,et al.  Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.

[17]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[18]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[19]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[20]  A. Kyle,et al.  The Flash Crash: High-Frequency Trading in an Electronic Market , 2017 .

[21]  Paolo Giorgini,et al.  Sociotechnical Trust: An Architectural Approach , 2011, ER.

[22]  Michael Rovatsos,et al.  Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..

[23]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[24]  Radu Calinescu,et al.  Large-scale complex IT systems , 2011, Commun. ACM.

[25]  Paolo Giorgini,et al.  Detecting Conflicts in Information Quality Requirements: the May 6, 2010 Flash Crash , 2014 .