• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ding Shuai, Lu Fujun, Yang Shanlin, Xia Chengyi. A Requirement-Driven Software Trustworthiness Evaluation and Evolution Model[J]. Journal of Computer Research and Development, 2011, 48(4): 647-655.
Citation: Ding Shuai, Lu Fujun, Yang Shanlin, Xia Chengyi. A Requirement-Driven Software Trustworthiness Evaluation and Evolution Model[J]. Journal of Computer Research and Development, 2011, 48(4): 647-655.

A Requirement-Driven Software Trustworthiness Evaluation and Evolution Model

More Information
  • Published Date: April 14, 2011
  • Software trustworthiness evaluation model is built upon the accurately eliciting of trustworthy requirements and the reasonable establish ment of indicator system in the domain special application. Toward software which has huge architecture and complex non-functional demands, trustworthy requirements become changing with software operational state transition. The stability of trustworthiness evaluation indicator system will be affected by trustworthy requirement dynamic evolution. The software trustworthiness evaluation and evolution problem are attracting wide attention in the field of trustworthy software. In this paper, a novel requirement-driven software trustworthiness evaluation and evolution model is designed. Firstly, several key technologies adopted in the process of software trustworthiness evaluation are analyzed and summarized, such as requirements analysis and indicators extraction, trustworthy evidence acquisition and conversion, etc. And the problem of trustworthiness evaluation adaptive solution under the requirements evolution is discussed. Secondly, incidence matrix is used to achieve correlation analysis between trustworthy attributes and then the variation rule of relative weight is revealed. On this basis, adaptive reconstruction device, which can analyze and solve the software trustworthiness evaluation indicator system of self-reconfiguration, is designed based on incidence matrix. Finally, a complete framework of trustworthiness evaluation evolution and evolution model is proposed. Experimental results show the rationality and validity of the model.
  • Related Articles

    [1]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [2]Wang Haiyan, Xiao Yikang. Dynamic Group Discovery Based on Density Peaks Clustering[J]. Journal of Computer Research and Development, 2018, 55(2): 391-399. DOI: 10.7544/issn1000-1239.2018.20160928
    [3]Fan Zhiqiang and Zhao Qinping. A Data-Clustering Based Robust SIFT Feature Matching Method[J]. Journal of Computer Research and Development, 2012, 49(5): 1123-1129.
    [4]Yu Canling, Wang Lizhen, and Zhang Yuanwu. An Enhancement Algorithm of Cluster Boundaries Precision Based on Grid's Density Direction[J]. Journal of Computer Research and Development, 2010, 47(5): 815-823.
    [5]Ma Haitao, Hao Zhongxiao, Zhu Yan. Checking Active XML Validation[J]. Journal of Computer Research and Development, 2008, 45(9): 1554-1560.
    [6]Chen Jianmei, Lu Hu, Song Yuqing, Song Shunlin, Xu Jing, Xie Conghua, Ni Weiwei. A Possibility Fuzzy Clustering Algorithm Based on the Uncertainty Membership[J]. Journal of Computer Research and Development, 2008, 45(9): 1486-1492.
    [7]Lü Zonglei, Wang Jiandong, Li Ying, and Zai Yunfeng. An Index of Cluster Validity Based on Modal Logic[J]. Journal of Computer Research and Development, 2008, 45(9): 1477-1485.
    [8]Jin Jun and Zhang Daoqiang. Semi-Supervised Robust On-Line Clustering Algorithm[J]. Journal of Computer Research and Development, 2008, 45(3): 496-502.
    [9]Ding Shifei, Shi Zhongzhi, Jin Fengxiang, Xia Shixiong. A Direct Clustering Algorithm Based on Generalized Information Distance[J]. Journal of Computer Research and Development, 2007, 44(4): 674-679.
    [10]Yue Shihong, Wang Zhengyou. Bisecting Grid-Based Clustering Approach and Its Validity[J]. Journal of Computer Research and Development, 2005, 42(9): 1505-1510.

Catalog

    Article views (775) PDF downloads (838) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return