Trustworthiness Evaluation of Component-Based Software Based on Level

Trustworthiness Evaluation of Component-Based Software Based on Level

Junfeng Tian Zhen Li* Zhuo Chang Peng Lin

School of Computer Science and Technology, Hebei University, Baoding, China

Department of Personnel, Hebei University, Baoding, China

Corresponding Author Email: 
lizhen_hbu@126.com
Page: 
67-85
|
DOI: 
https://doi.org/10.18280/ama_c.720105
Received: 
15 March 2017
|
Accepted: 
15 April 2017
|
Published: 
31 March 2017
| Citation

OPEN ACCESS

Abstract: 

The traditional trustworthiness evaluation of running software is inaccurate and incomplete because each component is as an independent unit during reliability evaluation. According to the drawbacks of traditional models, this paper proposed a trustworthiness evaluation approach of component-based software based on level. The trustworthy behavior trace diagram of component-based software was presented based on the call relation between components, and it described the trustworthy behavior trace of component in a recursive manner. With the combination of reliability and security of component, the paper proposed the dynamic trustworthiness evaluation of running software based on level and the trustworthiness evaluation approach of software based on running paths. Experiments and analyses showed that the approach could evaluate the dynamic trustworthiness of running component-based software more accurately, and could realize the trustworthiness evaluation of component-based software through the tests of running paths.

Keywords: 

Component-based software, trustworthiness evaluation, level, reliability, security.

1. Introduction
2. Trustworthy Behavior Trace of Component-Based Software
3. Simplification of Trustworthy Behavior Trace Diagram of Component-Based Software
4. Trustworthiness Evaluation of Component-Based Software
5. Experiments and Analyses
6. Conclusion
Acknowledgments

This paper was supported by the National Natural Science Foundation of China (61170254), the Natural Science Foundation of Hebei Province (F2015201089, F2014201099), the Youth Foundation of Hebei Educational Committee (QN2016149), and the Science Foundation of Hebei University (2013-250).

  References

1. H. Pang, Research on optimization of B2C e-commerce service quality oriented by customer demand, 2016, Revista de la Facultad de Ingeniería, vol. 31, no. 6, pp.103-113.

2. TCG specification architecture overview, http://www.trustedcomputinggroup.org/tcg-architecture-overview-version-1-4,  May 2016.

3. J. Wen, H.M. Wang, S. Ying, Y.C. Ni, T. Wang, Toward a software architectural design approach for trusted software based on monitoring,  2010, Chinese Journal of Computers, vol. 33, no. 12, pp.2321-2334.

4. D. Wang, J.S. Chang, W.B. Zhao, Verification model for trustworthiness of interaction between software components with Pi-calculus, 2012, Journal of Frontiers of Computer Science and Technology, vol. 6, no. 5, pp.419-429.

5. X.X. Luo, Z.Y. Tang, Y.J. Zhao, Dynamic software reliability assessment based on Markov chain, 2015, Application Research of Computers, vol. 32, no. 8, pp.2400-2405.

6. M. Mohammad, V. Alagar, A component-based development provess for trustworthy systems, 2012, Journal on Software: Evolution and Process, vol. 24, no. 7, pp.815-835.

7. G.N. Si, J. Xu, J.F. Yang, W. Shuo, An evaluation model for dependability of Internet-scale software on basis of Bayesian networks and trustworthiness, 2014, Journal of Systems and Software, vol. 89, pp.63-75.

8. H. Elshaafi, D. Botvich, Optimisation-based collaborative determination of component trustworthiness in service compositions, 2016, Security and Communication Networks, vol. 9, no. 6, pp.513-527.

9. X.H. Chen, J. Liu, Z.M. Liu. Requirements monitoring for Internetware: an interaction based approach, 2013, SCIENCE CHINA: Information Science, vol. 56, no. 8, pp.1-15.

10. X.L. Liu, A.X. Wang, L. Wang, Quality evaluation model and algorithm of software system based on fuzzy closeness degree, 2016, Revista de la Facultad de Ingeniería, vol.31, no.7, pp.144-151.

11. C.X. Shen, H.G. Zhang, H.M. Wang, J. Wang, B. Zhao, F. Yan, F.J. Yu, L.Q. Zhang, M.D. Xu, Research on trusted computing and its development, 2010, SCIENCE CHINA: Information Sciences, vol. 40, no. 2, pp.139-166.

12. X.G.Mao, Y.J. Deng, A general model for component-based software reliability, 2004, Journal of Software, vol. 15, no. 1, pp.27-32.

13. W. Zhang, W.Q. Zhang, Study of improved component-based software reliability model based on route, 2011, Computer Science, vol. 38, no. 2, pp.148-151.

14. L. Nautiyal, N. Gupta, S.C. Dimri, Measurement of the reliability of a component-based development using a path-based approach, 2014 ACM SIGSOFT Software Engineering Notes, vol. 39, no. 6, pp.1-5.

15. C.J. Hsu, C.Y. Huang, An adaptive reliability analysis using path testing for complex component-based software systems, 2011, IEEE Transactions on Reliability, vol. 60, no. 1, pp.158-170.

16. W.L.Wang, Y. Wu, M.H. Chen, An architecture-based software reliability model, 1999, Proceedings of the 5th Pacific Rim International Symposium on Dependable Computing, Hong Kong, pp. 143-150.