Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns

被引:0
|
作者
Mohammadi, Nazila Gol [1 ]
Ulfat-Bunyadi, Nelufar [1 ]
Heisel, Maritta [1 ]
机构
[1] Univ Duisburg Essen, Paluno, Duisburg, Germany
关键词
Trust; Trustworthiness; Requirements refinement; Problem diagrams; Six-Variable Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The trustworthiness of cyber-physical systems (CPS) that support complex collaborative business processes is an emergent property. New technologies like cloud computing bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might introduce new vulnerabilities and threats caused by collaboration and data exchange over the Internet. Hence, users become more concerned about trust. In order to address users' trust concerns, trustworthiness requirements for the CPS must be elicited and satisfied. They describe the properties (qualities) the CPS must possess in order to be trustworthy. In this paper, we suggest a problem-based requirements engineering method that supports specifically the derivation of trustworthiness requirements. Based on identified trust concerns of users, trust assumptions are made explicit in problem diagrams. They express the conditions under which users are willing to trust. The problem diagrams and trust assumptions are then refined until they are concrete enough to derive trustworthiness requirements from them. During the refinement process, trust assumptions may influence and modify the system design (and vice versa, i.e. due to a certain system design, new trust concerns may arise that need to be addressed). In this way, users' trust concerns are considered right from the beginning and trustworthiness is designed into the CPS. An application example from the healthcare domain is used to demonstrate our approach.
引用
收藏
页码:337 / 346
页数:10
相关论文
共 50 条
  • [2] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE
    Fassbender, Stephan
    Heisel, Maritta
    Meis, Rene
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
  • [3] Problem-based Elicitation of Security Requirements The ProCOR Method
    Wirtz, Roman
    Heisel, Maritta
    Meis, Rene
    Omerovic, Aida
    Stolen, Ketil
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 26 - 38
  • [4] Collaboration in Problem-Based E-Learning: Requirements Engineering Activity
    Rahman, Noorihan Abdul
    Sahibuddin, Shamsul
    [J]. PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 233 - 237
  • [5] The development of staff concerns during implementation of problem-based learning in a nursing programme
    Gwele, NS
    [J]. MEDICAL TEACHER, 1997, 19 (04) : 275 - 284
  • [6] A Trust Algorithm based on the Latent Trust from Users to Items
    Fang, Meiyu
    Hu, Zhongkai
    [J]. PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 834 - 846
  • [7] Learning from the problems of problem-based learning
    Richard J Epstein
    [J]. BMC Medical Education, 4 (1)
  • [8] Lessons learned from problem-based learning
    Burke, Joanne
    Ditchfield, Carol
    Flynn, Margaret-Ann
    Sneddon, Sharon
    Stapleton, Genevieve
    [J]. CLINICAL TEACHER, 2020, 17 (06): : 719 - 722
  • [9] Problem-Based Learning: From where to where?
    Hamilton, John
    [J]. CLINICAL TEACHER, 2005, 2 (01): : 45 - 48
  • [10] Problem-based deprescribing Using your patients' clinical concerns to guide medication review
    Molnar, Frank
    Frank, Chris
    [J]. CANADIAN FAMILY PHYSICIAN, 2019, 65 (04) : 266 - 266