Behavior-aware Trustworthiness Study of Networked Software

被引:5
|
作者
Fang, Xianwen [1 ]
Jiang, Changjun [2 ]
Fan, Xiaoqin [2 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Minist Educ, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
trustworthiness; software behavior; networked software; consistency; Petri net; PETRI NETS; DEADLOCK PREVENTION;
D O I
10.1080/18756891.2010.9727721
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The essence characteristics of software trustworthiness are software execution effect and behavior can be anticipated, which is an important index of software quality. Under the open and dynamic environments, some uncertainty factors cause the behavior of software to be uncontrolled, uncertainty and unpredictable. Behavior-aware networked software trustworthiness research methods are proposed in the paper. Firstly, we propose the analysis methods of the consistency between the inferred specification models with component specification model. Then, for analyzing the component interaction behavior, the behavior relativity analyzing method is presented based on Petri net. Finally, aimed to the outer factors, we analyze the behavioral congruence between theoretical composite models with dynamic behavior model based on running logs. Theoretical analysis and the example analysis indicated that this method is benefit to analyze the trustworthiness of networked software.
引用
收藏
页码:542 / 552
页数:11
相关论文
共 50 条
  • [21] Trustworthiness-aware knowledge graph representation for recommendation
    Ge, Yan
    Ma, Jun
    Zhang, Li
    Li, Xiang
    Lu, Haiping
    KNOWLEDGE-BASED SYSTEMS, 2023, 278
  • [22] Reasoning about Software Trustworthiness with Derivation Trees
    Deng Y.
    Chen Z.
    Wang Y.
    Du W.
    Mao B.
    Liang Z.
    Lin Q.
    Li J.
    Journal of Shanghai Jiaotong University (Science), 2024, 29 (03) : 579 - 587
  • [23] Software-Behavior-Aware Prefetching Method in Embedded RISC Systems
    Li, Sizhao
    Han, Xinyu
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, : 16 - 19
  • [24] A Data Mining Based Measurement Method for Software Trustworthiness
    Yuan Yuyu
    Han Qiang
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (01): : 13 - 16
  • [25] Distributed software monitoring and trustworthiness evaluation based on checkpoints
    Li Z.
    Tian J.-F.
    Chang Z.
    Ma X.-X.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (03): : 8 - 19
  • [26] A Hierarchy Relation Model of Software System Trustworthiness Representation
    Cheng, Ping
    Chen, Yan
    Zhang, Zhiheng
    Zuo, Jiankang
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 497 - 501
  • [27] An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems
    Ali-Eldin, Amr
    Van Den Berg, Jan
    Daskapan, Semir
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (04) : 44 - 61
  • [28] API trustworthiness: an ontological approach for software library adoption
    Eghan, Ellis E.
    Alqahtani, Sultan S.
    Forbes, Christopher
    Rilling, Juergen
    SOFTWARE QUALITY JOURNAL, 2019, 27 (03) : 969 - 1014
  • [29] API trustworthiness: an ontological approach for software library adoption
    Ellis E. Eghan
    Sultan S. Alqahtani
    Christopher Forbes
    Juergen Rilling
    Software Quality Journal, 2019, 27 : 969 - 1014
  • [30] Trustworthiness requirement-oriented software process modeling
    Zhang, Xuan
    Wang, Xu
    Kang, YanNi
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2018, 30 (12)