Survey on software trustworthiness evaluation: standards, models and tools

被引:0
|
作者
Shen G.-H. [1 ]
Huang Z.-Q. [1 ]
Xie B. [2 ]
Zhu Y.-Q. [1 ]
Liao L.-L. [1 ]
Wang F. [1 ]
Liu Y.-L. [1 ]
机构
[1] College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing
[2] Department of Computer Science and Technology, Peking University, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2016年 / 27卷 / 04期
基金
中国国家自然科学基金;
关键词
Safety-critical software; Software metrics; Software quality; Software trustworthiness; Trustworthiness evaluation;
D O I
10.13328/j.cnki.jos.005024
中图分类号
学科分类号
摘要
The failure of safety-critical software could result in death, injury and damage to people or loss of equipment or property. Therefore, it is important to evaluate whether software trustworthiness fulfills the user needs (i.e., trustworthiness evaluation). This paper first compares the definition of software trustworthiness and its evaluation. Then, it surveys the software trustworthiness evaluation from three different aspects: Standards, models, and CASE tools. This work studies these aspects from the view of domain-independent as well as domain-dependent. In summary, there is great progress being made for software trustworthiness evaluation theoretically and practically while its universality and scalability are still need to be improved. © Copyright 2016, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:955 / 968
页数:13
相关论文
共 58 条
  • [1] Athalye P., Maksimovic D., Erickson R., High-Performance front-end converter for avionics applications, IEEE Trans. on Aerospace and Electronic Systems, 39, 2, pp. 462-470, (2003)
  • [2] (2012)
  • [3] Wu W.H., Kelly T., Safety tactics for software architecture design, Proc. of the 28th Annual Int'l Computer Software and Applications Conf., (2004)
  • [4] Research challenges in high confidence systems, Proc. of the Committee on Computing, Information and Communications Workshop, (1997)
  • [5] Gates B., Trustworthy computing, (2002)
  • [6] Specification Architecture Overview Specification, (2007)
  • [7] Wang H.M., Tang Y.B., Yin G., Li L., Credible mechanism of Internet software, Science in China-Series E: Information Sciences, 36, 10, pp. 1156-1169, (2006)
  • [8] ISO/IEC 15408-1:2009. Information technology-security techniques-evaluation criteria for IT security. Part 1: Introduction and General Model, (2009)
  • [9] ISO/IEC 25010:2011: Systems and software engineering-Systems and software quality requirements and evaluation (SQuaRE)-System and software quality models, (2011)
  • [10] Avizienis A., Laprie J.C., Randell B., Landwehr C., Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. on Dependable and Secure Computing, 1, 1, pp. 11-33, (2004)