A new metric model for trustworthiness of softwares

As people depend more and more on softwares, there has been an increasing demand for the trustworthiness of the software. To measure the trustworthiness of software, we need to design appropriate trustworthy metrics. We once proposed four metric criteria for the multi-dimensional trustworthiness of the software and a metric model which satisfies these four criteria. In this paper, we describe a new metric model for the trustworthiness of the software which satisfies almost all these four criteria. Compared with the previous model, this model is better in the view of substitutivity. We also give a polynomial-time combinational algorithm for estimating the weight vectors appeared in the model based on the priority methods.

[1]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Noel Bryson,et al.  A Goal Programming Method for Generating Priority Vectors , 1995 .

[3]  Wilhelm Hasselbring,et al.  Toward trustworthy software systems , 2006, Computer.

[4]  Wilhelm Hasselbring,et al.  Trustworthy software systems: a discussion of basic concepts and terminology , 2006, SOEN.

[5]  R. K. Singh,et al.  An evaluation of Boolean expression testing techniques , 2006, SOEN.

[6]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[7]  G. Crawford The geometric mean procedure for estimating the scale of a judgement matrix , 1987 .

[8]  Jeffrey M. Voas Trusted Software's Holy Grail , 2004, Software Quality Journal.

[9]  Hongwei Tao,et al.  A New Metric Model for Trustworthiness of Softwares , 2010 .

[10]  Bojan Srdjevic,et al.  Combining different prioritization methods in the analytic hierarchy process synthesis , 2005, Comput. Oper. Res..

[11]  David Hartvigsen Representing the strengths and directions of pairwise comparisons , 2005, Eur. J. Oper. Res..

[12]  Zhongsheng Hua,et al.  A chi-square method for obtaining a priority vector from multiplicative and fuzzy preference relations , 2007, Eur. J. Oper. Res..

[13]  Benhai Yu,et al.  The Trustworthiness Metric Model of Software Process Quality Based-On Life Circle , 2009, 2009 International Conference on Management and Service Science.

[14]  Natali Hritonenko,et al.  Mathematical Modeling in Economics, Ecology and the Environment , 1999 .

[15]  Ding Shuai,et al.  Trustworthy Software Evaluation Using Utility Based Evidence Theory , 2009 .

[16]  Larry Bernstein Trustworthy software systems , 2005, SOEN.

[17]  Shari Lawrence Pfleeger,et al.  Software Metrics : A Rigorous and Practical Approach , 1998 .

[18]  B. Golany,et al.  A multicriteria evaluation of methods for obtaining weights from ratio-scale matrices , 1993 .

[19]  Wei Li,et al.  Dynamical characteristics of software trustworthiness and their evolutionary complexity , 2009, Science in China Series F: Information Sciences.

[20]  Edward Amoroso,et al.  Toward an approach to measuring software trust , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[21]  Ye Yang,et al.  Process Trustworthiness as a Capability Indicator for Measuring and Improving Software Trustworthiness , 2009, ICSP.

[22]  Y. Danieli Guide , 2005 .

[23]  Shanlin Yang,et al.  The Evaluation of Software Trustworthiness with FAHP and FTOPSIS Methods , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[24]  Wang Ji,et al.  High Confidence Software Engineering Technologies , 2003 .

[25]  Jin Maozhong,et al.  Research on Testing-Based Software Credibility Measurement and Assessment , 2009, 2009 WRI World Congress on Software Engineering.

[26]  Miodrag Potkonjak,et al.  Enabling trusted software integrity , 2002, ASPLOS X.

[27]  Edward Amoroso,et al.  A process-oriented methodology for assessing and improving software trustworthiness , 1994, CCS '94.

[28]  Yixiang Chen,et al.  A Metric Model for Trustworthiness of Softwares , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[29]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[30]  Wei Li,et al.  Complexity of software trustworthiness and its dynamical statistical analysis methods , 2009, Science in China Series F: Information Sciences.

[31]  Eng Ung Choo,et al.  Effectiveness Analysis of Deriving Priority Vectors from Reciprocal Pairwise Comparison Matrices , 2008, Asia Pac. J. Oper. Res..

[32]  Yixiang Chen,et al.  Average Transitive Trustworthy Degrees for Trustworthy Networks , 2009, RSKT.

[33]  M. Singh,et al.  Comparison analysis of methods for deriving priorities in the analytic hierarchy process , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[34]  Shari Lawrence Pfleeger,et al.  Software metrics (2nd ed.): a rigorous and practical approach , 1997 .

[35]  Eng Ung Choo,et al.  A common framework for deriving preference values from pairwise comparison matrices , 2004, Comput. Oper. Res..

[36]  G. Crawford,et al.  A note on the analysis of subjective judgment matrices , 1985 .