+
X
Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Communications and Multimedia Security
  3. Conference paper

Trustworthy Software Development

  • Conference paper
  • pp 233–247
  • Cite this conference paper
Communications and Multimedia Security (CMS 2013)
Trustworthy Software Development
  • Sachar Paulus19,
  • Nazila Gol Mohammadi20 &
  • Thorsten Weyer20 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8099))

Included in the following conference series:

  • IFIP International Conference on Communications and Multimedia Security
  • 1966 Accesses

  • 16 Citations

  • 7 Altmetric

Abstract

This paper presents an overview on how existing development methodologies and practices support the creation of trustworthy software. Trustworthy software is key for a successful and trusted usage of software, specifically in the Cloud. To better understand what trustworthy software applications actually mean, the concepts of trustworthiness and trust are defined and put in contrast to each other. Furthermore, we identify attributes of software applications that support trustworthiness. Based on this groundwork, some well-known software development methodologies and best practices are analyzed with respect on how they support the systematic engineering of trustworthy software. Finally, the state of the art is discussed in a qualitative way, and an outlook on necessary research efforts and technological innovations is given.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

CodeTrust

Chapter © 2018

Major Research Achievements

Chapter © 2024

Software and its Perceived Trustworthiness

Chapter © 2024

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cloud Computing
  • Software Engineering
  • Open Source
  • Software Management
  • Software Testing
  • Theory and Algorithms for Application Domains

References

  1. Gol Mohammadi, N., Paulus, S., Bishr, M., Metzger, A., Koennecke, H., Hartenstein S., Pohl, K.: An Analysis of Software Quality Attributes and Their Contribution to Trustwor-thiness. In: 3rd International conference on Cloud Computing and Service Science (CLOSER), Special Session on Security Governance and SLAs in Cloud Computing – CloudSecGov, available in SCITEPRESS Digital Library, to appear in Springer-Verlag, SSRI, Aachen (2013)

    Google Scholar 

  2. Leveson, N., Stolzy, J.: Safety analysis using Petri nets. IEEE Transactions on Software Engineering 13(3), 386–397 (1987)

    Article  Google Scholar 

  3. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley Series in Software Design. Wiley (2005)

    Google Scholar 

  4. Mei, H., Huang G., Xie, T.: Internetware: A software paradigm for internet computing, pp. 26–31. IEEE Computer Society (2012)

    Google Scholar 

  5. Araújo Neto, A., Vieira, M.: Untrustworthiness: A Trust-Based Security Metric. In: 4th International Conference on Risks and Security of Internet and Systems (CRiSIS), France, pp. 123–126 (2009)

    Google Scholar 

  6. San-Martín, S., Camarero, C.: A Cross-National Study on Online Consumer Perceptions, Trust, and Loyalty. Journal of Organizational Computing and Electronic Commerce 22, 64–86 (2012)

    Article  Google Scholar 

  7. Chen, C., Wang, K., Liao, S., Zhang, Q., Dai, Y.: A Novel Server-based Application Ex-ecution Architecture. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 2, pp. 678–683 (2009)

    Google Scholar 

  8. Harris, L.C., Goode, M.M.: The four levels of loyalty and the pivotal role of trust: a study of online service dynamics. Journal of Retailing 80(2), 139–158 (2004)

    Article  Google Scholar 

  9. S-Cube: Quality Reference Model for SBA. S-Cube - European Network of Excellence (2008), http://www.s-cube-network.eu/results/deliverables/wp-jra-1.3/Reference_Model_for_SBA.pdf/view

  10. ISO/IEC 9126-1: Software Engineering – Product quality – Part: Quality Model, International Organization of Standardization, Geneva, Switzerland (2001)

    Google Scholar 

  11. Gómez, M., Carbó, J., Benac-Earle, C.: An Anticipatory Trust Model for Open Distributed Systems. In: Butz, M.V., Sigaud, O., Pezzulo, G., Baldassarre, G. (eds.) ABiALS 2006. LNCS (LNAI), vol. 4520, pp. 307–324. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Yolum, P., Singh, M.P.: Engineering self-organizing referral networks for trustworthy service selection. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35(3), 396–407 (2005)

    Article  Google Scholar 

  13. Yan, Z., Goel, G.: An adaptive trust control model for a trustworthy component software platform. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 226–238. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Boehm, B.W., Brown, J.R., Lipow, M.: Quantitative Evaluation of Software Quality. In: Proceedings of the 2ndInternational Conference on Software Engineering (ICSE), pp. 592–605. IEEE Computer Society Press, Los Alamitos (1976)

    Google Scholar 

  15. Adrion, W., Branstad, M., Cherniavsky, J.: Validation, Verification, and Testing of Computer Software. ACM Computing Surveys 14, 159–192 (1982)

    Article  Google Scholar 

  16. McCall, J.A., Richards, P.K., Walters, G.F.: Factors in Software Quality. Volume I. Concepts and Definitions of Software Quality. US Department of Commerce, National Technical Information Service (NTIS), Final technical rept. (1977)

    Google Scholar 

  17. Royce, W.W.: Managing the Development of Large Software Systems: Concepts and Techniques. In: IEEE WESTCON, Los Angeles CA, pp. 1–9 (1970)

    Google Scholar 

  18. Boehm, B.: A Spiral Model of Software Development and Enhancement. IEEE Computer 21(5), 61–72 (1988)

    Article  Google Scholar 

  19. Sommerville, I.: Software Engineering, 9th edn. Pearson, Boston (2011)

    Google Scholar 

  20. Jayaswal, B.K., Patton, P.C.: Design for Trustworthy Software: Tools, Techniques and Methodology for Developing Robust Software. Prentice Hall (2011)

    Google Scholar 

  21. Wordworth, J.: Software Engineering with B. Addison Wesley Longman (1996)

    Google Scholar 

  22. Schmidt, D.C.: Model-Driven Engineering. IEEE Computer 39(2), 25–31 (2006)

    Article  Google Scholar 

  23. McGraw, G., Chess, B.: A Software Security Framework: Working Towards a Realistic Maturity Model. InformIT (October 2008)

    Google Scholar 

  24. ISO/IEC 15408:Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model, Geneva, Switzerland (2009)

    Google Scholar 

  25. ISO/IEC 21827:2002: Information technology – Systems Security Engineering – Capability Maturity Model (SSE-CMM) Geneva, Switzerland (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Economics, Brandenburg University of Applied Sciences, 14770, Brandenburg an der Havel, Germany

    Sachar Paulus

  2. paluno – The Ruhr Institute for Software Technology, University of Duisburg-Essen, 45127, Essen, Germany

    Nazila Gol Mohammadi & Thorsten Weyer

Authors
  1. Sachar Paulus
    View author publications

    Search author on:PubMed Google Scholar

  2. Nazila Gol Mohammadi
    View author publications

    Search author on:PubMed Google Scholar

  3. Thorsten Weyer
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science, KU Leuven, iMinds-DistriNet, Celestijnenlaan 200A, 3001, Leuven, Belgium

    Bart De Decker

  2. Otto-von-Guericke-Universität Magdeburg, Universitätsplatz 2, 39106, Magdeburg, Germany

    Jana Dittmann  & Christian Kraetzer  & 

  3. Fachhochschule Brandenburg, Otto-von-Guericke-Universität Magdeburg, Magdeburger Str. 50, 14770, Brandenburg, Germany

    Claus Vielhauer

Rights and permissions

Reprints and permissions

Copyright information

© 2013 IFIP International Federation for Information Processing

About this paper

Cite this paper

Paulus, S., Mohammadi, N.G., Weyer, T. (2013). Trustworthy Software Development. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds) Communications and Multimedia Security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40779-6_23

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-40779-6_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40778-9

  • Online ISBN: 978-3-642-40779-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Software development
  • Trustworthiness
  • Trust
  • Trustworthy software
  • Trustworthy development practices

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

23.94.208.52

Not affiliated

Springer Nature

© 2025 Springer Nature

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载