A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework

As trust becomes increasingly important in software domain, software trustworthiness — as a complex high-composite concept, has developed into a big challenge people have to face, especially in the current open, dynamic and ever-changing Internet environment. Furthermore, how to recognize and define trust problem from its nature and how to measure software trustworthiness correctly and effectively play a key role in improving users’ trust in choosing software. Based on trust theory in the field of humanities and sociology, this paper proposes a measurable S2S (Social-to-Software) software trustworthiness framework, introduces a generalized indicator loss to unify three parts of trustworthiness result, and presents a whole metric solution for software trustworthiness, including the advanced J-M model based on power function and time-loss rate for ability trustworthiness measurement, the fuzzy comprehensive evaluation advanced-model considering effect of multiple short boards for basic standard trustworthiness, and the identity trustworthiness measurement method based on the code homology detecting tools. Finally, it provides a case study to verify that the solution is applicable and effective.

[1]  George J. Schick,et al.  An Analysis of Competing Software Reliability Models , 1978, IEEE Transactions on Software Engineering.

[2]  Yuanyuan Zhou,et al.  CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.

[3]  Feng Xu,et al.  Enhancing trustworthiness evaluation in internetware with similarity and non-negative constraints , 2013, Internetware.

[4]  Xu Wang,et al.  A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes , 2010, ICSP.

[5]  Jason Bennett Thatcher,et al.  Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.

[6]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[7]  Ping Luo,et al.  A Measurable SocialToTech Software Trust Framework , 2019 .

[8]  Ping Luo,et al.  Forecasting severity of software vulnerability using grey model GM(1,1) , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[9]  Bertrand Meyer,et al.  The grand challenge of trusted components , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[10]  Hong-wei Tao,et al.  Another Metric Model for Trustworthiness of Softwares Based on Partition , 2010 .

[11]  Michael P. Wiper,et al.  Software Reliability Modeling with Software Metrics Data via Gaussian Processes , 2013, IEEE Transactions on Software Engineering.

[12]  Wang Yibo,et al.  Impacts of permafrost changes on alpine ecosystem in Qinghai-Tibet Plateau , 2006 .

[13]  Tang Yang-bin,et al.  Trustworthiness of Internet-based software , 2006 .

[14]  Xu Jing,et al.  A Dependability Evaluation Model for Internetware Based on Bayesian Network , 2012 .

[15]  Yixiang Chen,et al.  A Metric Model for Trustworthiness of Softwares , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[16]  Lu Gang Verification Oriented Trustworthiness Evidence and Trustworthiness Evaluation of Software , 2010 .

[17]  Peng Xin Research on Software Trustworthiness Evaluation Model and Its Implementation , 2011 .

[18]  Brent A. Scott,et al.  Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.

[19]  A. Immonen,et al.  Trustworthiness Evaluation and Testing of Open Source Components , 2007 .

[20]  Ping Luo,et al.  Research of Trustworthy Software System in the Network , 2012, 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming.

[21]  Zhu Man Approach for Evaluating the Trustworthiness of Service Agent , 2011 .

[22]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[23]  Wilhelm Hasselbring,et al.  Trustworthy software systems: a discussion of basic concepts and terminology , 2006, SOEN.

[24]  Klaus Pohl,et al.  Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems , 2013, CLOSER.

[25]  Martin L. Shooman,et al.  Probabilistic Models for Software reliability Prediction , 1972, Statistical Computer Performance Evaluation.

[26]  Yang Fuqing Thinking on the Development of Software Engineering Technology , 2005 .

[27]  Liu Zeng-lian Progress in software trustworthiness metrics models , 2010 .

[28]  Ross J. Anderson,et al.  Security in open versus closed systems - the dance of Boltzmann , 2002 .

[29]  Shinji Kusumoto,et al.  CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..

[30]  Edward Amoroso,et al.  A process-oriented methodology for assessing and improving software trustworthiness , 1994, CCS '94.

[31]  Yang Fu Thinking on the Development of Software Engineering Technology , 2005 .

[32]  Wei Li,et al.  Optimized statistical analysis of software trustworthiness attributes , 2012, Science China Information Sciences.

[33]  Z. Jelinski,et al.  Software reliability Research , 1972, Statistical Computer Performance Evaluation.

[34]  Yafang Huang,et al.  SSRGM: Software Strong Reliability Growth Model Based on Failure Loss , 2012, PAAP.

[35]  Zhi Jin,et al.  Approach for Evaluating the Trustworthiness of Service Agent: Approach for Evaluating the Trustworthiness of Service Agent , 2011 .

[36]  Yixiang Chen,et al.  A new metric model for trustworthiness of softwares , 2010, Telecommunication Systems.

[37]  Amrit L. Goel,et al.  Time-Dependent Error-Detection Rate Model for Software Reliability and Other Performance Measures , 1979, IEEE Transactions on Reliability.

[38]  Omar H. Alhazmi,et al.  Quantitative vulnerability assessment of systems software , 2005, Annual Reliability and Maintainability Symposium, 2005. Proceedings..

[39]  Eric Rescorla,et al.  Is finding security holes a good idea? , 2005, IEEE Security & Privacy.

[40]  Xin Wu,et al.  Quantitative Evaluation across Software Development Life Cycle Based on Evidence Theory , 2013, ICIC.

[41]  Mao Xiaoguang A Classification Model for Software Trustworthiness , 2010 .

[42]  Witold Suryn,et al.  Software Trustworthiness: Past, Present and Future , 2012, ISCTCS.

[43]  F. Schneider Trust in Cyberspace , 1998 .