Abstract
Modern applications are becoming increasingly large-scale and network-centric, involving a variety of different types of system entities. Also, the assurance requirements for these systems are evolving due to the continuing emergence of new threats from new operational environments. To assure the trustworthiness of these systems to a sufficiently high degree of confidence is a challenging task. Most existing methods require different specialized assessment techniques for not only different types of system entities but also different trustworthiness aspects. Also, most existing techniques lack consideration of the overall system trustworthiness assessment from an integrated system perspective or fail to provide a holistic view. To address these problems, we develop an ontology-based approach to provide systematic guidelines for net-centric system assessment. The ontology-based approach captures evolving system trustworthiness aspects and effectively models their relationships and correlations. It can also organize system entities and associate appropriate assessment techniques for each class of system entities and their integrations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle, “Privacy in e-commerce: examining user scenarios and privacy preferences,” Proceedings of the 1st ACM conference on Electronic commerce, Denver, Colorado, 1999, pp. 1-8.
T. Anderson, Resilient Computing Systems, John-Wiley, New York, 1985.
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Trans. on Dependable and Secure Computing, Vol. 1, No. 1, Jan.-Mar. 2004, pp. 11-33.
F. B. Bastani and A. Pasquini, “Assessment of a sampling method for measuring safety-critical software reliability,” Proceedings of 5th International Symposium on Software Reliability Engineering, November 1994, pp. 93-102.
A.M.K. Cheng, Real-Time Systems: Scheduling, Analysis, and Verification, Wiley Interscience, 2002.
Mike Chen, Emre Kıcıman, Eugene Fratkin, Eric Brewer, and Armando Fox, “Pinpoint: Problem determination in large, dynamic Internet services,” Dependable Systems and Networks, 2002.
Julie E. Cohen, “DRM and privacy,” Communications of the ACM (Special issue on digital rights management and fair use by design), Vol. 46, No. 4, April 2003, pp. 46-49
Riccardo Focardi, Fabio Martinelli, “A uniform approach for the definition of security properties,” World Congress on Formal Methods, 1999.
B.J. Fogg and H. Tseng, “The elements of computer credibility,” Proc. 1999 SIGCHI Conf. on Human Factors in Computing Systems, Pittsburgh, PA, 1999, pp. 80-87.
T.F. Lawrence, “The quality of service model and high assurance,” Proc. 1997 IEEE High-Assurance Systems Engineering Workshop, Washington, DC, Aug. 1997, pp. 38-39.
E. A. Lee and S. Edwards., “Precision Timed (PRET) Computation in Cyber-Physical System”, National Workshop on High Confidence Software Platforms for Cyber-Physical Systems: Research Needs and Roadmap, November, 2006.
N. Leveson, Software: System Safety and Computers, Addison Wesley, New York, 1995.
H.F. Lipson and D.A. Fisher, ”Survivability -A new technical and business perspective on security,” Proc. 1999 workshop on New security Paradigms, Caledon Hills, Ontario, Canada, 1999, pp. 33-39.
B. Littlewood and L. Strigini, “Software reliability and dependability: A roadmap,” Proceedings of the 22nd International Conference on Software Engineering, Limerick, Ireland, A. Finkelstein (ed), June 2000, pp. 177-188.
J.W.S. Liu, Real-Time Systems, Prentice Hall, 2000.
J. McDermott, "Attack-potential-based survivability modeling for high-consequence systems," 2005. Proc. 3rd IEEE Intl. Work. on Information Assurance (IWIA'05), March 2005, pp. 119-130.
R. A. Paul, “DoD towards software services,” Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, February 2005, pp. 3-6.
G. Vecellio and W. M. Thomas, "Issues in the assurance of component-based software," Proc. 2000 IEEE Intl. Work.on Component-Based Software Engineering, Limerick, Ireland, Jun. 2000.
J. Voas, “Certifying software for high-assurance environments,” IEEE Software, Vol. 16, No. 4, Jul./Aug. 1999, pp. 48-54.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Paul, R., Dong, J., Yen, IL., Bastani, F. (2009). Trustworthiness Assessment Framework for Net-Centric Systems. In: Zhang, LJ., Paul, R., Dong, J. (eds) High Assurance Services Computing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-87658-0_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-87658-0_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-87657-3
Online ISBN: 978-0-387-87658-0
eBook Packages: Computer ScienceComputer Science (R0)