Abstract
Due to increasing system decentralization, component heterogeneity, and interface complexities, many trustworthiness challenges become more and more complicated and intertwined. Moreover, there is a lack of common understanding of software trustworthiness and its related development methodology. This paper reports preliminary results from an ongoing collaborative research project among 6 international research units, which aims at exploring theories and methods for enhancing existing software process techniques for trustworthy software development. The results consist in two parts: 1) the proposal of a new concept of Process Trustworthiness, as a capability indicator to measure the relative degree of confidence for certain software processes to deliver trustworthy software; and 2) the introduction of the architecture of a Trustworthy Process Management Framework (TPMF) toolkit for process runtime support in measuring and improving process trustworthiness in order to assess and assure software trustworthiness.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boehm, B.: A view of 20th and 21st century software engineering. In: International Conference on Software Engineering. Proceedings of the 28th international conference on Software Engineering, pp., 12–29 (2006)
Nelson, M., Clark, J., Spurlock, M.A.: Curing the Software Requirements and Cost Estimating Blues. PM: November/December (1999)
Department of Defense, National Computer Security Center: Trusted Computer System Evaluation Criteria. DoD 5200.28-STD (1985)
Parnas, D., et al.: Evaluation of Safety-Critical Software. CACM 33(6), 636–648 (1990)
Amoroso, E.C.T., Watson, J., Weiss, J.: A process-oriented methodology for assessing and improving software trustworthiness. In: Proceedings of the 2nd ACM Conference on Computer and communications security, Virginia, USA, pp. 39–50 (1994)
Capability Maturity Model Integration Version 1.2 Overview, http://www.sei.cmu.edu/cmmi/adoption/pdf/cmmi-overview07.pdf
Common Criteria Portal, http://www.commoncriteriaportal.org/
DACS, Software Project Management for Software Assurance: A State-of-the-Art-Report, September 30 (2007)
DACS and IATAC, Software Security Assurance: A State-of-the-Art-Report, July 31 (2007)
United States Federal Aviation Administration, Safety and Security Extension for integrated Capability Maturity Model (September 2004)
CMU, Systems Security Engineering Capability Maturity Model SSE-CMM: Model Description Document, Version 3.0, June 15 (2003)
International Standards Organization, ISO 9126, Ist edn. (2001)
International Standards Organization, ISO 27000, Ist edn. (2005)
International Standards Organization, ISO 9001, 2nd edn. (2005)
Tan, T., He, M., et al.: An Analysis to Understand Software Trustworthiness. Accepted by the 2008 International Symposium on Trusted Computing, China (November 2008)
Shu, F., Jiang, N., Gou, L.: Technical Report: A Trustworthiness Measurement Model. ISCAS/iTechs Technical Report #106 (November 2008)
Jones, C.: Applied Software Measurement: Assuring Productivity and Quality. McGraw-Hill, New York (1997)
Boehm, B.W., et al.: Software Cost Estimation with COCOMO II. Prentice-Hall, NY (2000)
Wang, Q., Gou, L., et al.: An Empirical Study on Establishing Quantitative Management Model for Testing Process. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2007. LNCS, vol. 4470, pp. 233–245. Springer, Heidelberg (2007)
Gou, L., Wang, Q., et al.: Quantitatively Managing Defects for Iterative Projects: An Industrial Experience Report in China. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 369–380. Springer, Heidelberg (2008)
Zhang, S., Wang, Y., et al.: Capability Assessment of Individual Software Development Processes Using Software Repositories and DEA. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 147–159. Springer, Heidelberg (2008)
Wang, Q., Li, M.: Measuring and improving software process in China. In: 2005 International Symposium on Empirical Software Engineering (2005)
Yang, D., Wu, D., et al.: WikiWinWin: A Wiki Based System for Collaborative Requirements Negotiation. In: HICSS (2008)
Li, Y., Li, J., et al.: Requirement-Centric Traceability for Change Impact Analysis: A Case Study. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 100–111. Springer, Heidelberg (2008)
Li, J., Hou, L., et al.: An Empirically-Based Process to Improve the Practice of Requirement Review. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 135–146. Springer, Heidelberg (2008)
Liu, D., Wang, Q., Xiao, J., Li, J., Li, H.: RVSim: A Simulation Approach to Predict the Impact of Requirements Volatility on Software Project Plans. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 307–315. Springer, Heidelberg (2008)
Dai, J., Xiao, J., Wang, Q., Li, M., Li, H.: Dynamically Optimize Process Execution Based on Process Agent. Accepted by 2008 International Conference on Software Engineering and Knowledge Engineering (SEKE 2008) (2008)
Li, J., Chen, Z., Wei, L., Xu, W.: Feather Selection via Least Squares Support Feature Machine. International Journal of Information Technology & Decision Making 6(4) (2007)
Du, J., Tan, T., He, M., et al.: Technical Report: A Process-Centric Approach to Assure Software Trustworthiness. ISCAS/iTechs Technical Report #106 (September 2008)
Wang, Q., Yang, Y.: Technical Report: A Process-Centric Methodology to Software Trustworthiness Assurance. ISCAS/iTechs Technical Report #105 (June 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, Y., Wang, Q., Li, M. (2009). Process Trustworthiness as a Capability Indicator for Measuring and Improving Software Trustworthiness. In: Wang, Q., Garousi, V., Madachy, R., Pfahl, D. (eds) Trustworthy Software Development Processes. ICSP 2009. Lecture Notes in Computer Science, vol 5543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01680-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-01680-6_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01679-0
Online ISBN: 978-3-642-01680-6
eBook Packages: Computer ScienceComputer Science (R0)