Skip to main content

Trustworthiness Assessment Framework for Net-Centric Systems

  • Chapter
  • First Online:
High Assurance Services Computing

Abstract

Modern applications are becoming increasingly large-scale and network-centric, involving a variety of different types of system entities. Also, the assurance requirements for these systems are evolving due to the continuing emergence of new threats from new operational environments. To assure the trustworthiness of these systems to a sufficiently high degree of confidence is a challenging task. Most existing methods require different specialized assessment techniques for not only different types of system entities but also different trustworthiness aspects. Also, most existing techniques lack consideration of the overall system trustworthiness assessment from an integrated system perspective or fail to provide a holistic view. To address these problems, we develop an ontology-based approach to provide systematic guidelines for net-centric system assessment. The ontology-based approach captures evolving system trustworthiness aspects and effectively models their relationships and correlations. It can also organize system entities and associate appropriate assessment techniques for each class of system entities and their integrations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle, “Privacy in e-commerce: examining user scenarios and privacy preferences,” Proceedings of the 1st ACM conference on Electronic commerce, Denver, Colorado, 1999, pp. 1-8.

    Google Scholar 

  2. T. Anderson, Resilient Computing Systems, John-Wiley, New York, 1985.

    Google Scholar 

  3. A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Trans. on Dependable and Secure Computing, Vol. 1, No. 1, Jan.-Mar. 2004, pp. 11-33.

    Article  Google Scholar 

  4. F. B. Bastani and A. Pasquini, “Assessment of a sampling method for measuring safety-critical software reliability,” Proceedings of 5th International Symposium on Software Reliability Engineering, November 1994, pp. 93-102.

    Google Scholar 

  5. A.M.K. Cheng, Real-Time Systems: Scheduling, Analysis, and Verification, Wiley Interscience, 2002.

    Google Scholar 

  6. Mike Chen, Emre Kıcıman, Eugene Fratkin, Eric Brewer, and Armando Fox, “Pinpoint: Problem determination in large, dynamic Internet services,” Dependable Systems and Networks, 2002.

    Google Scholar 

  7. Julie E. Cohen, “DRM and privacy,” Communications of the ACM (Special issue on digital rights management and fair use by design), Vol. 46, No. 4, April 2003, pp. 46-49

    Google Scholar 

  8. Riccardo Focardi, Fabio Martinelli, “A uniform approach for the definition of security properties,” World Congress on Formal Methods, 1999.

    Google Scholar 

  9. B.J. Fogg and H. Tseng, “The elements of computer credibility,” Proc. 1999 SIGCHI Conf. on Human Factors in Computing Systems, Pittsburgh, PA, 1999, pp. 80-87.

    Google Scholar 

  10. T.F. Lawrence, “The quality of service model and high assurance,” Proc. 1997 IEEE High-Assurance Systems Engineering Workshop, Washington, DC, Aug. 1997, pp. 38-39.

    Google Scholar 

  11. E. A. Lee and S. Edwards., “Precision Timed (PRET) Computation in Cyber-Physical System”, National Workshop on High Confidence Software Platforms for Cyber-Physical Systems: Research Needs and Roadmap, November, 2006.

    Google Scholar 

  12. N. Leveson, Software: System Safety and Computers, Addison Wesley, New York, 1995.

    Google Scholar 

  13. H.F. Lipson and D.A. Fisher, ”Survivability -A new technical and business perspective on security,” Proc. 1999 workshop on New security Paradigms, Caledon Hills, Ontario, Canada, 1999, pp. 33-39.

    Google Scholar 

  14. B. Littlewood and L. Strigini, “Software reliability and dependability: A roadmap,” Proceedings of the 22nd International Conference on Software Engineering, Limerick, Ireland, A. Finkelstein (ed), June 2000, pp. 177-188.

    Google Scholar 

  15. J.W.S. Liu, Real-Time Systems, Prentice Hall, 2000.

    Google Scholar 

  16. J. McDermott, "Attack-potential-based survivability modeling for high-consequence systems," 2005. Proc. 3rd IEEE Intl. Work. on Information Assurance (IWIA'05), March 2005, pp. 119-130.

    Google Scholar 

  17. R. A. Paul, “DoD towards software services,” Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, February 2005, pp. 3-6.

    Google Scholar 

  18. G. Vecellio and W. M. Thomas, "Issues in the assurance of component-based software," Proc. 2000 IEEE Intl. Work.on Component-Based Software Engineering, Limerick, Ireland, Jun. 2000.

    Google Scholar 

  19. J. Voas, “Certifying software for high-assurance environments,” IEEE Software, Vol. 16, No. 4, Jul./Aug. 1999, pp. 48-54.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Paul, R., Dong, J., Yen, IL., Bastani, F. (2009). Trustworthiness Assessment Framework for Net-Centric Systems. In: Zhang, LJ., Paul, R., Dong, J. (eds) High Assurance Services Computing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-87658-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-87658-0_2

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-87657-3

  • Online ISBN: 978-0-387-87658-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics