基于全生命周期的可信软件评价研究述评
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A review of the research on trusted software evaluation for whole life cycle
  • 作者:于本海 ; 秦晋 ; 邵良杉 ; 智荣腾 ; 杨永清
  • 英文作者:YU Benhai;QIN Jin;SHAO Liangshan;ZHI Rongteng;YANG Yongqing;Department of Economic and Management,Shanghai Institute of Technology;Shandongprovince Vehicle Networking Engineering & Technology Research Center;Department of Management Science and Engineering,Shandong Institute of Business and Technology;Liaoning Engineering Technology University Business Administration;
  • 关键词:可信软件 ; 软件过程 ; 可信软件测度 ; 软件生命周期 ; 软件产品
  • 英文关键词:trusted software;;software process;;software trustworthiness evaluation;;software life cycle;;software product
  • 中文刊名:FXKY
  • 英文刊名:Journal of Liaoning Technical University(Natural Science)
  • 机构:上海应用技术大学经济与管理学院;山东省车联网工程技术研究中心;山东工商学院管理科学与工程学院;辽宁工程技术大学工商管理学院;
  • 出版日期:2017-09-15
  • 出版单位:辽宁工程技术大学学报(自然科学版)
  • 年:2017
  • 期:v.36;No.229
  • 基金:国家自然科学基金(71471103,71271095,71301089,71371091,71501113)
  • 语种:中文;
  • 页:FXKY201709018
  • 页数:8
  • CN:09
  • ISSN:21-1379/N
  • 分类号:102-109
摘要
针对软件可信性评价问题,将软件全生命周期分为开发过程和运行维护两个阶段,运用文献分析法对2006年-2015年国家自然科学基金委在可信软件领域资助的情况进行分析,系统研究了国内外可信软件评价相关最新研究成果.在可信软件过程评价方面,主要侧重于可信软件过程实体可信、过程行为可信以及过程能力可信评价模型研究;在可信软件产品评价方面,主要侧重于保密安全性、生存性、容错性、可靠性、可靠安全性、实时性研究.从学科分布来看,可信软件研究充分体现管理学、软件工程、计算机科学技术等多学科交叉特征.
        Software trustworthiness evaluation is a significant and complicated scientific problem.This paper divided the whole life cycle of software into two stages-the development process and operation maintenance,analyzed the situation of 2006-2015 National Natural Science Foundation of China in the field of trusted software by using literature analysis method.The latest research achievements of trusted software evaluation in the related field of domestic and overseas was systematically studied.In the aspect of trusted software process evaluation,this study mainly focused on the research of trusted software process entity trust,process behavior trust and process capability trust evaluation model.In the aspect of trusted software product evaluation,this study mainly focused on the research of security,survivability,fault-tolerance,reliability,safety and real-time.From the point of view of subjects distribution,trusted software research has fully reflects the strong performance of multi-subjects crossed of management science,software engineering,computer science and technology,and other characteristics.
引文
[1]杨善林,丁帅,褚伟.一种基于效用和证据理论的可信软件评估方法[J].计算机研究与发展,2009(7):1 152-1159.YANG Shanlin,DING Shuai,CHU Wei.Trustworthy software evaluation using utility based evidence theory[J].Journal of Computer Research and Development,2009(7):1 152-1 159.
    [2]熊伟,王晓暾.基于质量功能展开的可信软件需求映射方法[J].浙江大学学报(工学版),2010(5):881-886.XIONG Wei,WANG Xiaodun.Method for mapping software dependability requirements based on quality function deployment[J].Journal of Zhejiang University(Engineering Science),2010(5):881-886.
    [3]刘克,单志广,王戟,等.“可信软件基础研究”重大研究计划综述[J].中国科学基金,2008(3):145-151.LIU Ke,SHAN Zhiguang,WANG Ji,et al.Overview on major research plan of trustworthy software[J].Bulletin of National Natural Science Foundation of China,2008(3):145-151.
    [4]李旻.基于CMMI的可信软件风险管理研究[D].哈尔滨:哈尔滨工业大学,2009.
    [5]于本海.可信软件测度理论与方法[M].北京:科学出版社,2014.
    [6]范晓东.12306的互联网猜想[J].互联网周刊,2012(3):56-58.FAN Xiaodong.The Internet guess of 12306[J].China Internet Week,2012(3):56-58.
    [7]高常水,史春腾,唐梓午.我国信息安全产业发展态势及对策研究[J].科学管理研究,2013(3):70-73.GAO Changshui,SHI Chunteng,TANG Ziwu.Research on the development trend of information security industry in China[J].Scientific Management Research,2013(3):70-73.
    [8]王怀民,尹刚,谢冰,等.基于网络的可信软件大规模协同开发与演化[J].中国科学(信息科学),2014(1):1-19.WANG Huaimin,YI Gang,XIE Bing,et al.Research on network-based large-scale collaborative development and evolution of trustworthy software[J].Science China(Information Sciences),2014(1):1-19.
    [9]Anderson J P.Computer Security Technology Planning Study.Volume2[Z]DTIC Document,1972.
    [10]Congress U S,Ota S.Technology,Survivability and Software[Z]OTA-ISC-353(Washington,DC:US Government Printing Office,1988.
    [11]Amoroso E,Taylor C,Watson J,et al.A process-oriented methodology for assessing and improving software trustworthiness[C].Proceedings of the2nd ACM Conference on Computer and communications security,Virginia,USA,2014:39–50.
    [12]陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003(S1):1 933-1 938.CHEN Huowang,WANG Ji,DONG Wei.High confidence software engineering technologies[J].Acta Electronica Sinica,2003(S1):1 933-1 938.
    [13]王怀民,唐扬斌,尹刚,等.互联网软件的可信机理[J].中国科学(E辑:信息科学),2006(10):1 156-1 169.WANG Huaimin,TANG Yangbin,YI Gang,et al.The trustworth mechanism of Internet software[J].SCIENCE IN CHINA Ser.E Information Sciences,2006(10):1156-1169.
    [14]沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E辑:信息科学),2007(2):129-150.SHEN Changxiang,ZHANG Huanguo,FENG Dengguo,et al.Information security review[J].SCIENCE IN CHINA Ser.E Information Sciences,2007(2):129-150.
    [15]王婧,陈仪香,顾斌,等.航天嵌入式软件可信性度量方法及应用研究[J].中国科学(技术科学),2015(2):221-228.WANG Jing,CHEN Yixiang,GU Bin,et al.An approach to measureing and grading software trust for spacecraft software[J].Science In China(Technology Sciences),2015(2):221-228.
    [16]Boehm B W,Brown J R,Kaspar H.Characteristics of software quality[J].Ingeniería Y Territorio,1978,10(2):20-27.
    [17]Voas J.Trusted software's holy grail[J].Software Quality Journal,2003,11(1):9-17.
    [18]THEODORAKOPOULOS G,BARAS J S.On trust models and trust evaluation metrics for adhoc networks[J].Selected Areas in Communications,IEEE Journal on,2006,24(2):318-328.
    [19]LENZINI G,TOKMAKOFF A,MUSKENS J.Managing trustworthiness in component-based embedded systems[J].Electronic Notes in Theoretical Computer Science,2007(179):143-155.
    [20]Bevilacqua V,Mastronardi G,Menolascina F,et al.Bayesian gene regulatory network inference optimization by means of genetic algorithms[J].Journal of Universal Computer Science,2009,15(4):826-839.
    [21]蔡斯博,邹艳珍,邵凌霜,等.一种支持软件资源可信评估的框架[J].软件学报,2010(2):359-372.CAI Sibo,ZOU Yanzhen,SHAO Lingshuang,et al.Framework supporting software assets evaluation on trustworthiness[J].Journal of Software,2010(2):359-372.
    [22]杨善林,丁帅,付超.考虑信息源相关的软件可信性评估模型[J].中国管理科学,2009(6):163-169.YANG Shanlin,DING Shuai,FU Chao.A Software Trustworthiness evaluation model considering correlation of information sources[J].Chinese Journal of Management Science,2009(6):163-169.
    [23]庄琭,蔡勉,李晨.基于软件行为的可信动态度量[J].武汉大学学报(理学版),2010(2):133-137.ZHUANG Lu,CAI Mian,LI Chen.Software behavior-based trusted dynamic measurement[J].Journal of Wuhan University(Natural Science Edition),2010(2):133-137.
    [24]卢刚,王怀民,毛晓光.基于认知的软件可信评估证据模型[J].南京大学学报(自然科学版),2010(4):456-463.LU Gang,WANG Huaimin,MAO Xiaoguang.A cognitive-based evidence model for software trustworthiness evaluation[J].Journal of Nanjing University(Natural Sciences),2010(4):456-463.
    [25]陈建明,刘松,李志蜀,等.基于形式化监控的可信软件构造模型[J].计算机工程,2011(1):65-68.CHEN Jianming,LIU Song,LI Zhishu,et al.Trusted software programming model based on formal monitoring[J].Computer Enginering,2011(1):65-68.
    [26]田俊峰,韩金娥,杜瑞忠,等.基于软件行为轨迹的可信性评价模型[J].计算机研究与发展,2012(7):1 514-1 524.TIAN Junfeng,HAN Jine,DU Ruizhong,et al.Creditability evaluation model on software behavior trace[J].Journal of Computer Research and Development,2012(7):1 514-1 524.
    [27]PAULUS S,MOHAMMADI N G,WEYER T.Trustworthy software development[C].Communications and Multimedia Security:14th IFIP TC6/TC 11 International Conference,2013:233-247.
    [28]WANG Y,ZENG G,WANG Q,et al.Research on trustworthiness evaluation method of software resources based on fuzzy sets[J].Journal of Software,2013,8(12):3 214-3 221.
    [29]张卫祥,刘文红,吴欣.基于数据融合的全生命周期软件可信性定量评估方法[J].计算机科学,2013(S2):192-195.ZHANG Weixiang,LIU Wenhong,WU Xin.Quantitative evaluation across software development life cycle based on data fusion[J].Computer Science,2013(S2):192-195.
    [30]HUTH M,KUO J H.Towards verifiable trust management for software execution[C].Trust and Trustworthy Computing:6th International Conference,2013:275-276.
    [31]DE Florio V,Primiero G.A framework for trustworthiness assessment based on fidelity in cyber and physical domains[J].Procedia Computer Science,2015(52):996-1 003.
    [32]MOHAMMADI N G,BANDYSZAK T,KALOGIROS C,et al.A framework for evaluating the end-to-end trustworthiness[C].IEEE Trustcom/Big Data SE/ISPA,2015:638-645.
    [33]JIAO Hongqiang,TIAN Junfeng.T.he Software trustworthiness evaluation model based on subjective logic[J].International Journal of Hybrid Information Technology,2015,8(1):35-50.
    [34]罗新星,唐振宇,赵玉洁.基于马尔可夫链的可信软件动态评估模型[J].计算机应用研究,2015(8):2 400-2 405.LUO Xinxing,TANG Zhenyu,ZHAO Yujie.Dynamic software reliability assessment based on Markov chain[J].Application Research of Computers,2015(8):2 400-2 405.
    [35]PAULK M C,CURTIS B,CHRISSIS M B,et al.Capability maturity model,version 1.1[J].Software,IEEE,1993,10(4):18-27.
    [36]KWARK Y H,IBBS C W.Assessing project management maturity[J].Project Management Journal,2000,31(1):32-43.
    [37]郭树行,兰雨晴,金茂忠.软件构件的可信保证研究[J].计算机科学,2007(5):243-246.GUO Shuxing,LAN Yuqing,JIN Maozhong.Some Issues about Trusted Components Research[J].Computer Science,2007(5):243-246.
    [38]TIAN L,LIN C,JI T.Kind of quantitative evaluation of user behaviour trust using AHP[J].Journal of Computational Information Systems,2007,3(4):1329-1 334.
    [39]宿为民,朱三元.支持过程度量的软件过程建模方法的研究[J].软件学报,1999(8):843-849.SU Weimin,ZHU Sanyuan.Research on metric-supported software process modeling methodology[J].Journal of Software,1999(8):843-849.
    [40]CHRISSIS M B,KONRAD M,SHRUM S.CMMI guidlines for process integration and product improvement[M].Addison-Wesley Longman Publishing Co.,Inc.,2003.
    [41]DAVIS N,HUMPHREY W,REDWINE JR S T,et al.Processes for producing secure software[J].Security&Privacy,IEEE,2004,2(3):18-25.
    [42]WANG Q,XIAO J,LI M,et al.A process-agent construction method for software process modeling in Soft PM[C].Proceedings of SPW/Pro Sim,2006:204-213.
    [43]Grant K P,Pennypacker J S.Project management maturity:An assessment of project management capabilities among and between selected industries[J].Engineering Management,IEEE Transactions on,2006,53(1):59-68.
    [44]王崇倡,孙尚宇,宋伟东.基于Windows Mobile的测量软件的开发[J].辽宁工程技术大学学报(自然科学版),2011,30(S1):18-21.WANG Chongchang,SUN Shangyu,SONG Weidong.Surveying software development based on Windows Mobile[J].Journal of Liaoning Technical University(Natural Science),2011,30(S1):18-21.
    [45]杜晶,杨叶,王青,等.基于证据的可信软件过程评估方法[J].计算机科学与探索,2011(6):501-512.DU Jing,YANG Ye,WANG Qing,et al.evidence-based trustworthy software process assessment method[J].Journal of Frontiers of Computer Science and Technology,2011(6):501-512.
    [46]DE FLORIO V,BLONDIA C.System structure for dependable software systems[A].Springer,2011:594-607.
    [47]PARK B,OH S,PEDRYCZ W.The design of polynomial function-based neural network predictors for detection of software defects[J].Information Sciences,2013,229:40-57.
    [48]LI J,LI M,WU D,et al.An integrated risk measurement and optimization model for trustworthy software process management[J].Information Sciences,2012,191:47-60.
    [49]HOEKSTRA M,LAL R,Pappachan P,et al.Using innovative instructions to create trustworthy software solutions[C].Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy 2013.
    [50]INSAURRALDE C C.Model-merged development for analysis and design of dependable software systems[C].IEEE International Systems Conference,2013:164-169.
    [51]孙家泽,王曙燕.一种基于测试数据和D-S证据理论的可信性度量模型[J].计算机工程与科学,2015(6):1 109-1 113.SUN Jiaze,WANG Shuyan.A software credibility measurement model based on test data and D-S theory[J].Computer Enginering&Science,2015(6):1 109-1 113.
    [52]PERKUSICH M,SOARES G,ALMEIDA H,et al.A procedure to detect problems of processes in software development projects using Bayesian networks[J].Expert Systems with Applications,2015,42(1):437-450.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700