Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Optimized statistical analysis of software trustworthiness attributes

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Software trustworthiness has become one of the key restrictions for software service quality and the development of the software industry. However, trustworthiness attributes interlace structured and dynamical coupling relations, which causes great barriers for trustworthiness measurements of large-scale software. According to the dynamical evolutionary characteristics of software trustworthiness attributes, this paper proposes a new approach for optimizing the trustworthiness measurement in terms the kernel trustworthiness attributes, and improves a downsize-optimized statistical analysis method for software trustworthiness attributes based on their nonlinear relations. The improved method considerably simplifies the trustworthiness assessment of largescale software. Using theoretical analysis and numerical simulations, the feasibility of this method is verified using two typical examples that illustrate the realization of the trustworthiness measurement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kuhlmann D, Landfermanny R, Ramasamy H V. An Open Trusted Computing Architecture-Secure Virtual Machines Enabling User-Defined Policy Enforcement. IBM Reserch Report RZ3655. 2006

  2. Pearson S, Balacheff B. Trusted Computing Platforms: Tcpa Technology in Context. New Jersey: Premtice Hall PTR Prees, 2003

    Google Scholar 

  3. Delaune S, Kremer S, Ryan M D, et al. A formal analysis of authentication in the TPM. LNCS, 2011, 6151: 350–365

    Google Scholar 

  4. Sadeghi A R. Trusted computing: special aspects and challenges. In: Proceedings of the 34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’08). LNCS, Vol 4910. Heidelberg: Springer-Verlag Verlin, 2008. 98–117

    Google Scholar 

  5. ISO/IEC 11889-3. Information Technology-Trusted Platform Module-Part 3: Structures. 2009

  6. Schmidt H. Trustworthy components compositionality and prediction. J Syst Software, 2003, 65: 215–225

    Article  Google Scholar 

  7. Kirovski D, Drinic M, Potkonjak M. Enabling trusted software integrity. Oper Syst Rev, 2003, 36: 108–120

    Article  Google Scholar 

  8. Berger B. Trusted computing group history. Inform Secur Tech Rep, 2005, 10: 59–62

    Article  Google Scholar 

  9. Peter G N. Reflections on system trustworthiness. Adv Comput, 2007, 70: 269–310

    Article  Google Scholar 

  10. Jitender K C, Yogesh S. Code and data spatial complexity: two important software understandability measures. Inform Software Tech, 2003, 45: 539–546

    Article  Google Scholar 

  11. Erman C, Martha G. Software complexity and its impacts in embedded intelligent real-time systems. J Syst Software, 2005, 78: 128–145

    Article  Google Scholar 

  12. Pate-Cornell E, Dillon R. Probabilistic risk analysis for the NASA space shuttle: a brief history and current work. Relab Eng Syst Safe, 2001, 74: 345–352

    Article  Google Scholar 

  13. Jose L S, Ines H. An AHP-based methodology to rank critical success factors of executive information systems. Comp Stand Inter, 2005, 28: 1–12

    Article  Google Scholar 

  14. Littlewood W, Wright D. The use of multilegged arguments to increase confidence in safety claims for software-based systems: a study based on a BBN of an idealised example. IEEE Trans Software Eng, 2007, 33: 347–365

    Article  Google Scholar 

  15. Stéphane L P, Michael B. A trust analysis methodology for pervasive computing systems. In: Trusting Agents for Trusting Electronic Societies. LNCS, Vol 3577. Heidelberg: Springer-Verlag, 2005. 129–143

    Chapter  Google Scholar 

  16. Aarthi N, Vijay V. Dynamic trust enhanced security model for trusted platform based services. Future Gener Comp Sy, 2011, 27: 564–573

    Article  Google Scholar 

  17. Daniele C R, Andrea B, Montani S, et al. A dynamic Bayesian network based framework to evaluate cascading effects in a power grid. Eng Appl Artif Intel, 2012, 25: 683–697

    Article  Google Scholar 

  18. Zheng Z M, Ma S L, Li W, et al. Dynamical characteristics of software trustworthiness and their evolutionary. Sci China Ser F-Inf Sci, 2009, 52: 1328–1334

    Article  MATH  Google Scholar 

  19. Zheng Z M, Ma S L, Li W, et al. Complexity of software trustworthiness and its dynamical statistical analysis methods. Sci China Ser F-Inf Sci, 2009, 52: 1651–1657

    Article  MATH  Google Scholar 

  20. Christopher J B, Rua M. Dynamical conditions for convergence of a maximum entropy method for Frobenius Perron operator equations. Appl Math Comput, 2006, 182: 210–212

    Article  MathSciNet  MATH  Google Scholar 

  21. John G, Philip H. Nonlinear Oscillations, Dynamical Systems, and Bifurcation of Vector Fields. Berlin: Springer-Verlag, 1983

    Google Scholar 

  22. Lasota A, Mackey M. Chaos, Fractals and Noise. Berlin: Springer-Verlag, 1994

    MATH  Google Scholar 

  23. Robinson R C. An Introduction to Dynamical Systems: Continuous and Discrete (in Chinese). Beijing: China Machine Press, 2005

    Google Scholar 

  24. Beck C, Schlogl F. Thermo Dynamics of Chaotic Systems. New York: Combindye University Press, 1993

    Book  Google Scholar 

  25. Zhang Z F, Li C Z, Zheng Z M, et al. Bifurcation Theory in Vector Fields (in Chinese). Beijing: Higher Education Press, 1997

    Google Scholar 

  26. Brendan D G. Digital forensics of the physical memory. Dig Invest, 2007, 4: 62–64

    Article  Google Scholar 

  27. Liu H, Min Y. Calculation of two-dimensional characteristic invariant manifolds on the boundary of transient stability region in power system. Power Syst Technol, 2009, 33: 5–10

    MATH  Google Scholar 

  28. Ding J, Zhou A H. The projection method for computing multi-dimensional absolutely continuous invariant measures. J Stat Phys, 1994, 77: 899–908

    Article  MathSciNet  MATH  Google Scholar 

  29. Gary F. Approximating physical invariant measures of mixing dynamical systems in higher dimensions. Nonlinear Anal, 1998, 32: 831–860

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiao Zhang or ZhiMing Zheng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, X., Li, W., Zheng, Z. et al. Optimized statistical analysis of software trustworthiness attributes. Sci. China Inf. Sci. 55, 2508–2520 (2012). https://doi.org/10.1007/s11432-012-4646-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4646-z

Keywords