A New Approach for Trustworthy Software Development

Article Preview

Abstract:

In order to develop the trustworthy software, the paper merges the software trustworthiness into software life cycle and proposes a new approach for trustworthy software development. The software behavior and results can be expected and the behavior states can be monitored during software running by introducing the trustworthy behavior trace of software. In the software design phase, we inserted checkpoint sensor at each checkpoint of trustworthy software; in the software testing phase, we created the trustworthy behavior trace of software and updated it for software update. The experimental results show that the software developed with our approach can detect the anomaly of software successfully and verify the effectiveness of our approach.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

870-873

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H. Wang, Y. Tang, G. Yi and L. Li: The Trustworthiness Mechanism of Network Software. Science in China(Series E): Information Sciences. Vol. 36(2006), pp.1-14 (in Chinese).

Google Scholar

[2] H. Chen, J. Wang and W. Dong: High Confidence Software Engineering Technologies. Acta Electronica Sinica. Vol. 31(2003), pp.1933-1938 (in Chinese).

Google Scholar

[3] H. Zhao and J. Sun: An Algebraic Model of Service Oriented Trustworthy Software Architecture. Chinese Journal of Computers. Vol. 33(2010), pp.890-899 (in Chinese).

DOI: 10.3724/sp.j.1016.2010.00890

Google Scholar

[4] H. Zhang, F. Shu, Y. Yang, X. Wang and Q. Wang: A Fuzzy-based Method of Evaluating the Trustworthiness of Software Processes. Proc. International Conference on Software Process, Paderborn, Germany (2010), pp.297-308.

DOI: 10.1007/978-3-642-14347-2_26

Google Scholar

[5] G. Lu, H. Wang and X. Mao: Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software. Proc. the 7th International Conference on Autonomic and Trusted Computing, Xi'an, China (2010), pp.219-227.

DOI: 10.1007/978-3-642-16576-4_16

Google Scholar

[6] J. P. Wei and C. Pu: TOCTTOU Vulnerabilities in UNIX-style File Systems: an Anatomical Study. Proc. the 4th USENIX Conference on File and Storage Technologies, San Francisco, USA, (2005), pp.1-13.

DOI: 10.1016/j.cose.2010.09.004

Google Scholar