A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM)
Abstract
:1. Introduction
2. Related Research
2.1. Trustworthiness Software
2.2. Software Architecture
2.3. Trustworthiness Evaluation
2.4. This Paper’s Reviews
3. Software Architecture Trustworthiness Evaluation Based on POME and GDMM
3.1. Related Definition
- Definition 1: Trustworthiness is when an entity realizes the set target, its behaviors and consequences always can be expected.
- Definition 2: Trustworthy software refers to the fact that the service provided by the software system always conforms to people’s expectation and is still stable in case of interference.
- Definition 3: Trustworthiness of a software architecture refers the degree by which a software architecture conforms to people’s expectations, and supports the software life cycle and provides services in each stage of the life cycle.
- Definition 4: Trustworthy software architecture―if a software architecture meets people’s expectations, then it is a trustworthy software architecture.
3.2. Trustworthiness Attribute of a Software Architecture
3.3. Evaluation Method Based on POME and GDMM
Theorem 1 [37]
4. Case Analysis
4.1. Case 1
4.2. Case 2
5. Discussion and Conclusions
Acknowledgments
Conflicts of Interest
References
- Liu, K.; Shan, Z.; Wang, J.; He, J.; Zhang, Z.; Qin, Y. Overview on major research plan of trustworthy software. Sci. Found. China 2008, 22, 145–151. [Google Scholar]
- Xiong, G.; Chang, Z.; Sang, N. Survey on dependable computing. J. Comput. Appl 2009, 29, 915–920. [Google Scholar]
- Xiong, W.; Wang, J.; Cai, M. Trustworty software evaluation based on QFD. Appl. Res. Comput 2010, 27, 2991–2994. [Google Scholar]
- Sun, C.; Jin, M.; Liu, C. Overviews on Software Architecture Research. J. Softw 2010, 27, 2991–2994. [Google Scholar]
- Perry, D. Software Engineering and Software Architecture. Proceedings of the International Conference on Software Theory and Practice, Beijing, China, 7 January 2000; Electronic Industry Press: Beijing, China, 2000; pp. 1–4. [Google Scholar]
- Boehm, B. Engineering Context for Software Architecture. Proceedings of the 1st International Workshop on Architecture for Software Systems, Seattle, Seattle, WA, USA, 3 July 1995; ACM Press: New York, NY, USA, 1995; pp. 1–8. [Google Scholar]
- Zhou, X.; Huang, H.; Sun, J.; Yan, X. An introduction to software architecture quality evaluation. Comput. Sci 2003, 3, 49–52. [Google Scholar]
- Laprie, J.C. Dependable computing and fault tolerance: Concepts and Terminology. Proceedings of the 15th IEEE Symposium on Fault Tolerant Computing Systems, Toulouse, France, 17 July 1985; IEEE Computer Society: New York, NY, USA, 1985; pp. 2–11. [Google Scholar]
- Trusted Computing Group, Specification Architecture Overview. In Specification Revision 1.4; Trusted Computing Group: Beaverton, OR, USA, 2007.
- NSTC. Research Challenges in High Confidence Systems. Proceedings of the Committee on Computing, Information, and Communications Workshop, New York, NY, USA, 6–7 August 1997.
- Suri, N.; Jhumka, A.; Hiller, M.; Pataricza, A.; Islam, S.; Sarbu, C. A software integration approach for designing and assessing dependable embedded systems. J. Syst. Softw 2010, 83, 1780–1800. [Google Scholar]
- Shin, Y.; Choi, Y.; Lee, W.J. Integration testing through reusing representative unit test cases for high-confidence medical software. Comput. Biol. Med 2013, 43, 434–443. [Google Scholar]
- Oza, N.V.; Hall, T.; Rainer, A.; Grey, S. Trust in software outsourcing relationships: An empirical investigation of Indian software companies. Inf. Softw. Technol 2006, 48, 345–354. [Google Scholar]
- Babar, A.M.; Verner, J.M.; Nguyen, P.T. Establishing and maintaining trust in software outsourcing relationships: An empirical investigation. J. Syst. Softw 2007, 80, 1438–1449. [Google Scholar]
- Sheikh, I.; Ahamed, M.Z.; Wolfe, S. A software-based trust framework for distributed industrial management systems. J. Syst. Softw 2007, 80, 1621–1630. [Google Scholar]
- Garlan, D.; Perry, E. Introduction to the Special Issue on Software Architecture. IEEE Trans. Softw. Eng 1995, 21, 269–274. [Google Scholar]
- Shaw, M.; Garlan, D. Software Architecture: Perspectives on an Emerging Discipline; Prentice Hall: Upper Saddle River, NJ, USA, 1996. [Google Scholar]
- Garlan, D.; Shaw, M. An Introduction to Software Architecture. In Carnegie Mellon University Software Engineering Institute Technical Report; CMU/SEI-94-TR-21; Carnegie Mellon University: Pittsburgh, PA, USA, 1994. [Google Scholar]
- Richard, E.; Creps, M.A.S. The STARS Conceptual Framework for Reuse Processes; STARS Program Technical Report; STARS: Philadelphia, PA, USA, 1996. [Google Scholar]
- Rugina, A.-E.; Kanoun, K.; Kaâniche, M. A System Dependability Modeling Framework Using AADL and GSPNs. In Architecting Dependable Systems; Springer: Berlin, Germany, 2007; pp. 14–38. [Google Scholar]
- Feiler, P.; Rugina, A. Dependability Modeling with the Architecture Analysis & Design Language; CMU/SEI-2007-TN-043; Carnegie Mellon: Pittsburgh, PA, USA, 2007. [Google Scholar]
- Anjos, J.M.S.; Coracini, G.K.; Villani, E. A proposal and verification of a software architecture based on LabVIEW for a multifunctional robotic end-effector. Adv. Eng. Softw 2013, 55, 32–44. [Google Scholar]
- Weinreich, R.; Buchgeher, G. Towards supporting the software architecture life cycle. J. Syst. Softw 2012, 85, 546–561. [Google Scholar]
- Kazman, R.; Gagliardi, M.; Wood, W. Scaling up software architecture analysis. J. Syst. Softw 2012, 85, 1511–1519. [Google Scholar]
- Li, Z.; Liang, P.; Avgeriou, P. Application of knowledge-based approaches in software architecture: A systematic mapping study. Inf. Softw. Technol 2013, 55, 777–794. [Google Scholar]
- Breivold, H.P.; Crnkovic, I.; Larsson, M. A systematic review of software architecture evolution research. Inf. Soft. Technol 2012, 54, 16–40. [Google Scholar]
- Ding, S.; Yang, S.-L.; Fu, C. A novel evidential reasoning based method for software trustworthiness evaluation under the uncertain and unreliable environment. Expert Syst. Appl 2012, 39, 2700–2709. [Google Scholar]
- Schmidt, S.; Steele, R.; Dillon, T.S.; Chang, E. Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput 2007, 7, 492–505. [Google Scholar]
- Zarandi, H.R.; Miremadi, S.G. Dependability evaluation of Altera FPGA-based embedded systems subjected to SEUs. Microelectron. Reliab 2007, 47, 461–470. [Google Scholar]
- Bischofs, L.; Giesecke, S.; Gottschalk, M.; Hasselbring, W.; Warns, T.; Willer, S. Comparative evaluation of dependability characteristics for peer-to-peer architectural styles by simulation. J. Syst. Softw 2006, 79, 1419–1432. [Google Scholar]
- Lang, B.; Liu, X.; Wang, H.; Xie, B.; Mao, X. A Classification Model for Software Trustworthiness. J. Front. Comput. Sci. Technol 2010, 4, 231–239. [Google Scholar]
- Zhao, H.; Sun, J. An Algebraic Model of Service Oriented Trustworthy Software Architecture. Chin. J. Comput 2010, 33, 890–899. (In Chinese) [Google Scholar]
- Avizienis, A.; Laprie, J.-C.; Randell, B.; Landwehr, C. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Depend. Secur. Comput 2004, 1, 11–33. [Google Scholar]
- Albin, S.T. The Art of Software Architecture: Design Methods and Techniques; John Wiley & Sons Publishing: Indianapolis, IN, USA, 2003. [Google Scholar]
- Dang, L. Grey Decision-Making Analytic Methods; Huanghe Hydraulic and Power Press: Zhengzhou, China, 2005. (In Chinese) [Google Scholar]
- Jaynes, E.T. Information theory and statistical mechanics. Phys. Rev 1957, 106, 620–630. [Google Scholar]
- Xue, F. No-life Insurance Pricing Research Based on Information Entropy Method. Ph.D. Thesis, Dalian University of Technology, Dalian, China, 21 October 2008. [Google Scholar]
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.35,0.1) | (0.7,0.2) | (0.95,0.15) | (0.85,0.2) |
u2 | (0.75,0.3) | (0.7,0.25) | (0.4,0) | (0.75,0) |
u3 | (0.85,0.15) | (0.8,0) | (0.95,0) | (0.6,0.3) |
u4 | (0.8,0.15) | (0.7,0.1) | (0.5,0) | (0.5,0.3) |
u5 | (0.75,0.3) | (0.45,0.25) | (0.5,0.3) | (0.75,0.15) |
u6 | (0.45,0.25) | (0.55,0.15) | (0.3,0.2) | (0.55,0.15) |
u7 | (0.65,0.05) | (0.9,0.25) | (0.35,0.05) | (0.9,0.25) |
u8 | (0.8,0.3) | (0.6,0.3) | (0.95,0.3) | (0.45,0.3) |
u9 | (0.65,0.3) | (0.6,0.1) | (0.75,0.25) | (0.65,0.1) |
u10 | (0.55,0.3) | (0.4,0.3) | (0.9,0) | (0.55,0.05) |
u11 | (0.75,0) | (0.4,0.1) | (0.4,0.25) | (0.85,0) |
u12 | (0.7,0.05) | (0.75,0.3) | (0.4,0) | (0.5,0) |
u13 | (0.65,0.15) | (0.8,0.25) | (0.55,0.2) | (0.3,0.3) |
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.5,0.05) | (0.3,0.25) | (0.45,0) | (0.55,0.2) |
u2 | (0.65,0.25) | (0.4,0.25) | (0.9,0) | (0.8,0.25) |
u3 | (0.85,0.25) | (0.55,0.3) | (0.75,0.2) | (0.45,0.05) |
u4 | (0.65,0.3) | (0.35,0.05) | (0.85,0.3) | (0.5,0.25) |
u5 | (0.4,0.25) | (0.85,0.3) | (0.95,0.15) | (0.85,0.15) |
u6 | (0.8,0.25) | (0.75,0.2) | (0.7,0.3) | (0.8,0.05) |
u7 | (0.8,0.3) | (0.65,0.2) | (0.85,0.1) | (0.3,0.15) |
u8 | (0.85,0.25) | (0.8,0) | (0.35,0.15) | (0.95,0) |
u9 | (0.35,0.1) | (0.3,0.1) | (0.45,0) | (0.45,0.2) |
u10 | (0.8,0.2) | (0.8,0.2) | (0.8,0.3) | (0.6,0.3) |
u11 | (0.35,0.1) | (0.9,0.2) | (0.45,0) | (0.5,0.05) |
u12 | (0.5,0.05) | (0.3,0) | (0.55,0) | (0.35,0.25) |
u13 | (0.8,0.25) | (0.3,0.3) | (0.7,0) | (0.5,0.1) |
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.7,0.05) | (0.8,0.1) | (0.65,0.3) | (0.35,0.3) |
u2 | (0.75,0) | (0.85,0.15) | (0.35,0.05) | (0.95,0.25) |
u3 | (0.75,0.1) | (0.85,0.2) | (0.65,0.15) | (0.55,0.15) |
u4 | (0.75,0.05) | (0.95,0.05) | (0.4,0) | (0.65,0.25) |
u5 | (0.3,0.2) | (0.5,0.15) | (0.45,0.15) | (0.5,0.25) |
u6 | (0.5,0.2) | (0.75,0.2) | (0.8,0.25) | (0.9,0.3) |
u7 | (0.4,0.3) | (0.35,0.2) | (0.65,0.15) | (0.95,0.1) |
u8 | (0.65,0.1) | (0.75,0) | (0.5,0.15) | (0.65,0.2) |
u9 | (0.5,0.25) | (0.45,0.05) | (0.9,0.3) | (0.45,0.25) |
u10 | (0.3,0.15) | (0.55,0.15) | (0.95,0.25) | (0.9,0.15) |
u11 | (0.8,0) | (0.3,0.05) | (0.95,0.05) | (0.7,0.2) |
u12 | (0.4,0.3) | (0.85,0.05) | (0.8,0.15) | (0.3,0.2) |
u13 | (0.65,0.1) | (0.8,0.1) | (0.5,0) | (0.65,0.1) |
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.4,0.3) | (0.8,0.15) | (0.35,0.3) | (0.9,0.2) |
u2 | (0.9,0.3) | (0.4,0.05) | (0.7,0.2) | (0.55,0.2) |
u3 | (0.8,0.05) | (0.8,0) | (0.75,0.05) | (0.65,0.2) |
u4 | (0.35,0.2) | (0.45,0.05) | (0.6,0.05) | (0.6,0) |
u5 | (0.95,0.05) | (0.45,0.3) | (0.8,0.15) | (0.85,0.2) |
u6 | (0.85,0.1) | (0.5,0.15) | (0.95,0) | (0.35,0.05) |
u7 | (0.5,0.25) | (0.75,0.1) | (0.75,0.05) | (0.8,0.25) |
u8 | (0.6,0) | (0.5,0.05) | (0.3,0.05) | (0.75,0.15) |
u9 | (0.9,0) | (0.45,0.1) | (0.85,0.1) | (0.6,0.3) |
u10 | (0.45,0.3) | (0.65,0.3) | (0.5,0.1) | (0.9,0.05) |
u11 | (0.45,0.1) | (0.6,0.2) | (0.8,0.2) | (0.55,0.15) |
u12 | (0.55,0.2) | (0.95,0.15) | (0.7,0.2) | (0.65,0.25) |
u13 | (0.65,0.15) | (0.85,0.2) | (0.9,0) | (0.9,0.1) |
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.85,0.1) | (0.4,0.15) | (0.4,0.05) | (0.7,0.15) |
u2 | (0.9,0.05) | (0.95,0.05) | (0.35,0) | (0.3,0.1) |
u3 | (0.65,0.15) | (0.55,0.15) | (0.8,0.2) | (0.75,0) |
u4 | (0.8,0.3) | (0.8,0.05) | (0.65,0.2) | (0.95,0.2) |
u5 | (0.6,0) | (0.8,0.25) | (0.7,0.25) | (0.6,0.2) |
u6 | (0.85,0.3) | (0.6,0.25) | (0.75,0.05) | (0.6,0) |
u7 | (0.95,0.1) | (0.35,0.15) | (0.8,0.2) | (0.55,0.2) |
u8 | (0.55,0.3) | (0.75,0.1) | (0.35,0.15) | (0.75,0) |
u9 | (0.3,0) | (0.4,0.2) | (0.85,0.15) | (0.45,0.25) |
u10 | (0.85,0.1) | (0.5,0.15) | (0.55,0.2) | (0.55,0.15) |
u11 | (0.65,0.3) | (0.8,0.2) | (0.3,0) | (0.65,0.05) |
u12 | (0.6,0.2) | (0.9,0.3) | (0.35,0.05) | (0.3,0.25) |
u13 | (0.95,0.15) | (0.65,0.1) | (0.75,0.3) | (0.45,0.3) |
x1 | x2 | x3 | x4 | |
---|---|---|---|---|
u1 | (0.59,0.32) | (0.68,0.41) | (0.67,0.47) | (0.49,0.52) |
u2 | (0.73,0.37) | (0.73,0.45) | (0.47,0.29) | (0.88,0.46) |
u3 | (0.79,0.4) | (0.78,0.44) | (0.73,0.39) | (0.54,0.42) |
u4 | (0.74,0.38) | (0.78,0.32) | (0.51,0.32) | (0.59,0.52) |
u5 | (0.41,0.49) | (0.56,0.46) | (0.56,0.44) | (0.62,0.47) |
u6 | (0.55,0.48) | (0.71,0.45) | (0.68,0.51) | (0.81,0.48) |
u7 | (0.53,0.51) | (0.52,0.47) | (0.63,0.38) | (0.81,0.4) |
u8 | (0.72,0.43) | (0.73,0.32) | (0.56,0.44) | (0.67,0.44) |
u9 | (0.5,0.49) | (0.45,0.33) | (0.78,0.49) | (0.49,0.47) |
u10 | (0.45,0.45) | (0.57,0.45) | (0.91,0.47) | (0.77,0.42) |
u11 | (0.7,0.28) | (0.44,0.35) | (0.74,0.34) | (0.69,0.39) |
u12 | (0.48,0.46) | (0.72,0.35) | (0.67,0.35) | (0.35,0.43) |
u13 | (0.68,0.4) | (0.7,0.43) | (0.55,0.3) | (0.55,0.4) |
x1 | x2 | x3 | |
---|---|---|---|
u1 | (0.85,0.15) | (0.9,0.25) | (0.45,0.25) |
u2 | (0.65,0) | (0.55,0.2) | (0.5,0.2) |
u3 | (0.55,0.25) | (0.4,0.05) | (0.9,0.3) |
u4 | (0.75,0.2) | (0.65,0.1) | (0.55,0) |
u5 | (0.8,0.1) | (0.5,0) | (0.9,0.05) |
u6 | (0.35,0.25) | (0.95,0.1) | (0.75,0) |
u7 | (0.55,0.25) | (0.85,0.25) | (0.45,0.3) |
u8 | (0.7,0.2) | (0.4,0.3) | (0.95,0) |
u9 | (0.95,0.05) | (0.4,0.05) | (0.35,0) |
u10 | (0.7,0.1) | (0.5,0.05) | (0.75,0.05) |
u11 | (0.9,0.1) | (0.6,0.25) | (0.4,0.05) |
u12 | (0.6,0.15) | (0.6,0.2) | (0.55,0.1) |
u13 | (0.55,0.2) | (0.55,0.2) | (0.7,0.15) |
x1 | x2 | x3 | |
---|---|---|---|
u1 | (0.85,0.1) | (0.5,0.25) | (0.9,0.2) |
u2 | (0.9,0.05) | (0.95,0.25) | (0.45,0.05) |
u3 | (0.65,0.2) | (0.35,0.05) | (0.95,0.05) |
u4 | (0.85,0.05) | (0.75,0.05) | (0.5,0) |
u5 | (0.75,0.25) | (0.65,0.1) | (0.45,0) |
u6 | (0.75,0.3) | (0.45,0.2) | (0.35,0.15) |
u7 | (0.5,0.15) | (0.75,0.1) | (0.7,0.25) |
u8 | (0.7,0.3) | (0.9,0.05) | (0.55,0) |
u9 | (0.35,0.1) | (0.45,0.15) | (0.45,0) |
u10 | (0.85,0.15) | (0.3,0.25) | (0.55,0.25) |
u11 | (0.85,0.15) | (0.65,0.3) | (0.3,0.25) |
u12 | (0.85,0) | (0.65,0.3) | (0.7,0.2) |
u13 | (0.65,0.1) | (0.5,0.05) | (0.7,0.15) |
x1 | x2 | x3 | |
---|---|---|---|
u1 | (0.85,0) | (0.6,0) | (0.7,0.05) |
u2 | (0.85,0.1) | (0.5,0.3) | (0.65,0.1) |
u3 | (0.8,0.1) | (0.35,0.05) | (0.75,0.15) |
u4 | (0.5,0.3) | (0.65,0.1) | (0.4,0.3) |
u5 | (0.85,0.05) | (0.55,0.25) | (0.5,0) |
u6 | (0.9,0.1) | (0.7,0.25) | (0.4,0.05) |
u7 | (0.6,0.3) | (0.65,0.25) | (0.95,0.3) |
u8 | (0.3,0.3) | (0.5,0.2) | (0.8,0.25) |
u9 | (0.7,0.15) | (0.7,0.1) | (0.8,0.3) |
u10 | (0.5,0.15) | (0.9,0.3) | (0.9,0.15) |
u11 | (0.7,0.15) | (0.85,0) | (0.45,0.2) |
u12 | (0.65,0) | (0.65,0.25) | (0.4,0.15) |
u13 | (0.65,0.3) | (0.6,0) | (0.7,0.2) |
x1 | x2 | x3 | |
---|---|---|---|
u1 | (0.85,0.15) | (0.45,0) | (0.65,0.25) |
u2 | (0.45,0) | (0.85,0.2) | (0.6,0.15) |
u3 | (0.6,0.05) | (0.9,0.05) | (0.7,0) |
u4 | (0.6,0.15) | (0.45,0.05) | (0.6,0.05) |
u5 | (0.3,0.2) | (0.7,0.2) | (0.5,0.15) |
u6 | (0.45,0) | (0.5,0) | (0.7,0.25) |
u7 | (0.55,0.3) | (0.65,0.1) | (0.3,0.2) |
u8 | (0.6,0.1) | (0.45,0) | (0.3,0.2) |
u9 | (0.75,0.1) | (0.3,0) | (0.55,0.05) |
u10 | (0.9,0.25) | (0.9,0.05) | (0.55,0.3) |
u11 | (0.95,0.25) | (0.75,0.2) | (0.5,0.3) |
u12 | (0.8,0.15) | (0.65,0.05) | (0.55,0.3) |
u13 | (0.9,0.05) | (0.85,0) | (0.6,0.05) |
x1 | x2 | x3 | |
---|---|---|---|
u1 | (0.85,0.29) | (0.61,0.31) | (0.68,0.38) |
u2 | (0.71,0.23) | (0.71,0.43) | (0.55,0.31) |
u3 | (0.65,0.34) | (0.5,0.24) | (0.83,0.31) |
u4 | (0.68,0.36) | (0.63,0.26) | (0.51,0.28) |
u5 | (0.68,0.34) | (0.6,0.33) | (0.59,0.24) |
u6 | (0.61,0.35) | (0.65,0.33) | (0.55,0.3) |
u7 | (0.55,0.44) | (0.73,0.36) | (0.6,0.45) |
u8 | (0.58,0.41) | (0.56,0.33) | (0.65,0.3) |
u9 | (0.69,0.29) | (0.46,0.26) | (0.54,0.28) |
u10 | (0.74,0.35) | (0.65,0.35) | (0.69,0.38) |
u11 | (0.85,0.35) | (0.71,0.38) | (0.41,0.39) |
u12 | (0.73,0.26) | (0.64,0.39) | (0.55,0.38) |
u13 | (0.69,0.35) | (0.63,0.25) | (0.68,0.33) |
© 2014 by the authors; licensee MDPI, Basel, Switzerland This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Jiang, R. A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy 2014, 16, 4818-4838. https://doi.org/10.3390/e16094818
Jiang R. A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy. 2014; 16(9):4818-4838. https://doi.org/10.3390/e16094818
Chicago/Turabian StyleJiang, Rong. 2014. "A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM)" Entropy 16, no. 9: 4818-4838. https://doi.org/10.3390/e16094818
APA StyleJiang, R. (2014). A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy, 16(9), 4818-4838. https://doi.org/10.3390/e16094818