Volume 31 Issue 4
Jul.  2022
Turn off MathJax
Article Contents
ZHOU Wei, MA Yanfang, PAN Haiyu, “A Novel Trustworthiness Measurement Model Based on Weight and User Feedback,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 612-625, 2022, doi: 10.1049/cje.2020.00.391
Citation: ZHOU Wei, MA Yanfang, PAN Haiyu, “A Novel Trustworthiness Measurement Model Based on Weight and User Feedback,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 612-625, 2022, doi: 10.1049/cje.2020.00.391

A Novel Trustworthiness Measurement Model Based on Weight and User Feedback

doi: 10.1049/cje.2020.00.391
Funds:  This work was supported by the Natural Science Foundation of Anhui Province (2108085MF204), the Provincial Projects of Natural Science for Anhui Universities (KJ2019A0604), the Abroad Visiting of Excellent Young Talents of the Universities in Anhui Province (GXGWFX2019022), the National Natural Science Foundation of China (62162014, 62077029), and the Guangxi Natural Science Foundation of China (2018GXNSFAA281326)
More Information
  • Author Bio:

    is an M.S. candidate in software engineering from School of Computer Science and Technology, Huaibei Normal University. He received the B.E. degree from Huaibei Normal University. His research interests include blockchain, software trustworthiness measurement, cloud computing, and information security. (Email: zw540988737@163.com)

    (corresponding author) received the Ph.D. degree in computer science and technology from East China Normal University, Shanghai, China, in 2010. She is currently a Professor of computer science and technology with Huaibei Normal Unversity. She has finished National Natural Science Foundation of China in 2017 and Natural Science Foundation of Anhui Province in 2015 and 2019 and now is supported by the Natural Science Foundation for Colleges and Universities of Anhui Province. She is a Member of the CCF TCEBS and CCF TCFM. She has published some papers in academic journals such as Journal of Computer Science and Technology, Chinese Journal of Computers, Journal of Computer Research and Development. Her research interests include formal semantic model, formal method, and software trustworthiness measurement and allocation. (Email: clmyf@163.com)

    received the Ph.D. degree in computer science and technology from East China Normal University, Shanghai, China, in 2012. He is currently an Associate Professor of computer science with Guilin University of Electronic Technology. He has published some papers in academic journals such as IEEE Transactions on Fuzzy Systems, Theoretical Computer Science, International Journal of Approximate Reasoning, Fuzzy Sets and Systems, and Fundamenta Informaticae. His research interests include formal methods and reasoning about uncertainty in artificial intelligence. (Email: phyu76@126.com)

  • Received Date: 2020-11-29
  • Accepted Date: 2021-06-08
  • Available Online: 2021-08-18
  • Publish Date: 2022-07-05
  • Software trustworthiness is an essential criterion for evaluating software quality. In component-based software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
  • loading
  • [1]
    G. Shen, Z. Huang, B. Xie, et al., “Survey on software trustworthiness evaluation: Standards, models and tools,” Journal of Software, vol.27, no.4, pp.955–968, 2016. (in Chinese)
    [2]
    C. Lin, J. Hu, G. Li, et al., “A review on the architecture of software defined network,” Chinese Journal of Electronics, vol.27, no.6, pp.1111–1117, 2018. doi: 10.1049/cje.2018.05.013
    [3]
    D. Wang and Q. Wang, “Trustworthiness evidence supporting evaluation of software process trustworthiness,” Journal of Software, vol.29, no.11, pp.3412–3434, 2018. (in Chinese)
    [4]
    P.G. Neumann, “Inside risks trustworthiness and truthfulness are essential,” Communications of the ACM, vol.60, no.6, pp.26–28, 2017. doi: 10.1145/3084344
    [5]
    Q. Zhang, M. Zuo, Q. Cao, et al., “Research on SoftMan component dynamic evolution system and its distributed multi-tasks collaboration mechanism based on game theory,” Chinese Journal of Electronics, vol.27, no.4, pp.783–791, 2018. doi: 10.1049/cje.2018.01.004
    [6]
    J. He, Z. Shan, J. Wang, et al., “Review of the achievements of major research plan of trustworthy software,” Bulletin of the National Natural Sciences Foundation, vol.32, no.3, pp.291–296, 2018.
    [7]
    H. Wei, C. Shan, C. Hu, et al., “Software defect prediction via deep belief network,” Chinese Journal of Electronics, vol.28, no.5, pp.925–932, 2019. doi: 10.1049/cje.2019.06.012
    [8]
    H. Tao and Y. Chen, “A metric model for trustworthiness of softwares,” IEEE/WIC/ACM International Joint Conferences on Web Intelligence & Intelligent Agent Technologies, Milan, Italy, pp.69–72, 2009.
    [9]
    H. Tao, Y. Chen, H. Wu, et al., “A survey of software trustworthiness measurements,” International Journal of Performability Engineering, vol.15, no.9, pp.2364–2371, 2019. doi: 10.23940/ijpe.19.09.p9.23642372
    [10]
    H. Tao, H. Wu, and Y. Chen, “An approach of trustworthy measurement allocation based on sub-attributes of software,” Mathematics, vol.7, no.3, pp.237–252, 2019. doi: 10.3390/math7030237
    [11]
    H. Tao and Y. Chen, “A new metric model for trustworthiness of softwares,” Telecommunication Systems, vol.51, pp.95–105, 2012. doi: 10.1007/s11235-011-9420-9
    [12]
    Y. Ma, Y. Chen, and B. Gu, “An attributes-based allocation approach of software trustworthy degrees”, IEEE International Conference on Software Quality, Reliability and Security - Companion, Vancouver, BC, Canada, pp.89–94, 2015.
    [13]
    B. Wang, Y. Chen, S. Zhang, et al., “Updating model of software component trustworthiness based on users feedback,” IEEE Access, vol.7, pp.60199–60205, 2019. doi: 10.1109/ACCESS.2019.2892518
    [14]
    M. D. McIlroy, “Mass-produced software components”, Software Engineering: Report on a Conference Sponsored by the NATO Science Committee, Garmisch, Germany, pp.138–155, 1968.
    [15]
    C. Szyperski, D. Gruntz, and S. Murer, “Component software: Beyond object-oriented programming,” Communications of the ACM, vol.40, no.4, pp.38–39, 2003.
    [16]
    T. Vale, I. Crnkovic, E.S.D. Almeida, et al., “Twenty-eight years of component-based software engineering,” Journal of Systems and Software, vol.111, pp.128–148, 2016. doi: 10.1016/j.jss.2015.09.019
    [17]
    J. Zhang, “Reliability calculation of component-based software,” Journal of Computer Applications, vol.35, no.S2, pp.164–169, 2015. (in Chinese)
    [18]
    D. Huang, “Component-based software trustworthiness measurement and allocation model”, M.S.Thesis, Huaibei Normal University, Huaibei, China, 2019. (in Chinese)
    [19]
    B. Wang, “Research on trustworthiness measurement models based on software component”, Ph.D.Thesis, East China Normal University, Shanghai, China, 2019. (in Chinese)
    [20]
    M. Wang, Y. Ma, G. Li, et al., “Multi-value models for allocation of software component development costs based on trustworthiness,” IEEE Access, vol.8, pp.122673–122684, 2020. doi: 10.1109/ACCESS.2020.3007158
    [21]
    G.D. Bona and A. Forcina, “Analytic critical flow method (ACFM): A reliability allocation method based on analytic hierarchy process,” Journal of Failure Analysis and Prevention, vol.17, no.6, pp.1149–1163, 2017. doi: 10.1007/s11668-017-0353-9
    [22]
    A.P. Dumpster, “Upper and lower probabilities induced by a multivalued mapping,” Annals of Mathematical Statistics, vol.38, no.2, pp.325–339, 1967. doi: 10.1214/aoms/1177698950
    [23]
    G. A. Shafer, A Mathematical Theory of Evidence, New Jersey, USA: Princeton University Press, pp.78–103, 1976.
    [24]
    X. Fei and J. Zhou, “A D-S evidence weight computing method for conflict evidence,” Computer Engineering, vol.42, no.2, pp.142–145, 2016. (in Chinese)
    [25]
    C. Lin, C. Xue, J. Hu, et al., “Hierarchical architecture design of computer system,” Chinese Journal of Computers, vol.40, no.9, pp.1996–2017, 2017. (in Chinese)
    [26]
    W. Lu, F. Xu, J. LV, et al., “An approach of software reliability evaluation in the open environment,” Chinese Journal of Computers, vol.33, no.3, pp.452–462, 2010. (in Chinese) doi: 10.3724/SP.J.1016.2010.00452
    [27]
    Y. Ma, M. Wang, W. Zhou, et al., “A trustworthiness-based development cost allocation algorithm of modular software,” Computer Engineering & Science, vol.42, no.6, pp.1021–1029, 2020. (in Chinese)
    [28]
    X. Mao and Y. Deng, “A general model for component-based software reliability,” Journal of Software, vol.15, no.1, pp.27–32, 2004. (in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(20)

    Article Metrics

    Article views (1223) PDF downloads(95) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return