Behavior-aware Trustworthiness Study of Networked Software

被引:5
|
作者
Fang, Xianwen [1 ]
Jiang, Changjun [2 ]
Fan, Xiaoqin [2 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Minist Educ, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
trustworthiness; software behavior; networked software; consistency; Petri net; PETRI NETS; DEADLOCK PREVENTION;
D O I
10.1080/18756891.2010.9727721
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The essence characteristics of software trustworthiness are software execution effect and behavior can be anticipated, which is an important index of software quality. Under the open and dynamic environments, some uncertainty factors cause the behavior of software to be uncontrolled, uncertainty and unpredictable. Behavior-aware networked software trustworthiness research methods are proposed in the paper. Firstly, we propose the analysis methods of the consistency between the inferred specification models with component specification model. Then, for analyzing the component interaction behavior, the behavior relativity analyzing method is presented based on Petri net. Finally, aimed to the outer factors, we analyze the behavioral congruence between theoretical composite models with dynamic behavior model based on running logs. Theoretical analysis and the example analysis indicated that this method is benefit to analyze the trustworthiness of networked software.
引用
收藏
页码:542 / 552
页数:11
相关论文
共 50 条
  • [1] Behavior-aware Trustworthiness Study of Networked Software
    Fang X.
    Jiang C.
    Fan X.
    International Journal of Computational Intelligence Systems, 2010, 3 (5) : 542 - 552
  • [2] Behavior-Aware Computing: Applications and Challenges
    Favela, Jesus
    IEEE PERVASIVE COMPUTING, 2013, 12 (03) : 14 - 17
  • [3] A Behavior-aware Profiling of Handheld Devices
    Wei, Xuetao
    Valler, Nicholas C.
    Madhyastha, Harsha V.
    Neamtiu, Iulian
    Faloutsos, Michalis
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [4] A Behavior-Aware Profiling of Smart Contracts
    Wei, Xuetao
    Lu, Can
    Ozcan, Fatma Rana
    Chen, Ting
    Wang, Boyang
    Wu, Di
    Tang, Qiang
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 245 - 258
  • [5] Behavior-Aware Role Based Trust Management
    Li, Lan
    Zhang, Shaojun
    Fan, Lei
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1919 - 1924
  • [6] Profile cast:: Behavior-aware mobile networking
    Hsu, Wei-jen
    Dutta, Debojyoti
    Helmy, Ahmed
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 3033 - +
  • [7] BMLP: behavior-aware MLP for heterogeneous sequential recommendation
    Weixin Li
    Yuhao Wu
    Yang Liu
    Weike Pan
    Zhong Ming
    Frontiers of Computer Science, 2024, 18
  • [8] Behavior-Aware Network Segmentation using IP Flows
    Smeriga, Juraj
    Jirsik, Tomas
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [9] BMLP: behavior-aware MLP for heterogeneous sequential recommendation
    Li, Weixin
    Wu, Yuhao
    Liu, Yang
    Pan, Weike
    Ming, Zhong
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)
  • [10] Hybrid Sensing and Behavior-Aware in Pedestrian Hazard Detection
    Kim, Svetlana
    Yoon, YongIk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1114 - 1120