Improved Allocation and Reallocation Approaches for Software Trustworthiness Based on Mathematical Programming
Abstract
:1. Introduction
2. Software Trustworthiness Measurement and Classification
2.1. Software Trustworthiness Measurement Model
- T: trustworthy degree of software;
- n: number of trustworthy attributes;
- : trustworthy value of the i-th trustworthy attribute;
- : weight value of the i-th trustworthy attribute, satisfying .
- : number of trustworthy sub-attributes that comprise the i-th trustworthy attribute;
- : trustworthy value of the j-th sub-attribute of the i-th trustworthy attribute;
- : weight value of the j-th sub-attribute of the i-th trustworthy attribute, such that.
2.2. Software Trustworthiness Classification Model
3. Improved Allocation Approach for Software Trustworthiness
- T: trustworthy degree of software;
- : minimum degree that the software needs to reach;
- n: number of trustworthy attributes;
- : value of the i-th trustworthy attribute;
- : minimal value that all the trustworthy attributes must achieve, in the software trustworthiness classification model given in Table 1,for level I software, for level II software, for level III software, for level IV software, and for level V software;
- : minimal valueof next-level trustworthy attributes, in the softwaretrustworthiness classification modelgiven inTable 1,for level I software, for level II software, for level III software, for level IV software, andspecify for level V software;
- :weight valueof the i-th trustworthy attribute,such that .
- n: number of trustworthy attributes;
- : trustworthy attribute values;
- : minimum value that all the trustworthy attributes must reach;
- : weight valueof the i-thtrustworthy attribute, satisfying ,,;
- k: growth rate of the trustworthy attribute valuewith.
- k:growth rate of the trustworthy attribute value, such that .
- : minimum value that all the trustworthy attributes must reach, the meaning is the same as in Definition 1;
- : minimum value of next-level trustworthy attributes must achieve. The meaning is the same as in Definition 1;
- : trustworthy attribute weight values, such that ,
- : minimum degree that the software needs to achieve.
- (1)
- When , take the trustworthy attributes with the largest weight and make their values , and the values of the remaining attributes , so that the allocation conditions can be satisfied.
- (2)
- When , let
Algorithm 1 Algorithm for allocating software trustworthiness: for given and weight values of trustworthy attributes , output the assigned trustworthy attribute values . |
Input: Output:
|
4. Improved Reallocation Approach for Software Trustworthiness
- T: trustworthy degree of software;
- : minimum degree that the software needs to achieve after reallocation;
- n: number of trustworthy attributes;
- : attribute values after reallocation;
- : attribute values before reallocation;
- : minimum value that all the trustworthy attributes must reach after reallocation, in the software trustworthiness classification model given inTable 1, for level I software, for level II software, for level III software, for level IV software, and for level V software;
- : minimum valueof next-level trustworthy attributesafter reallocation, in the softwaretrustworthiness classification modelgiven inTable 1,for level I software, for level II software, for level III software, for level IV software, andspecify for level V software;
- : increased value of the i-th attribute after reallocation;
- :weight values of trustworthy attributes, satisfying .
- n: number of attributes;
- : attribute values after reallocation;
- : attribute values before reallocation;
- : minimum value that all the trustworthy attributes must reach after reallocation;
- : weight values of trustworthy attributes, satisfying ,,;
- k: growth rate of the attribute valuewith.
- k: growth rate of the attribute value, such that.
- : minimum value that all the trustworthy attributes must reach after reallocation. The meaning is the same as in Definition 5;
- :attribute values before reallocation;
- :minimum value of next-level trustworthy attributes after reallocation, see Definition 5 for specific meanings.
- : weight values of trustworthy attributes, satisfying ,,;
- :minimum degree that the software needs to achieve after reallocation.
- (1)
- When , let
- (2)
- When . Since the greater the attribute weight is, the more important it is to improve the trustworthiness of the software, set the value of the trustworthy attribute with the subscript in and the largest weight to , and delete this subscript from the set . Repeat the above process until is satisfied. If the software trustworthiness meets the reallocation requirements at this time, return. Otherwise, let , and jump to (1) to execute.
Algorithm2 Algorithm for reallocating software trustworthiness: for given trustworthy attribute values before reallocation, trustworthy attribute weight values that the software must achieve after reallocation and that all of the trustworthy attributes must reach after reallocation, output the reallocated trustworthy attribute values . |
Input: Output:
|
5. Trustworthiness Enhancement Specification for Spacecraft Software Based on Factory Reports
5.1. Software Trustworthiness Measurement and Classification Based on Factory Reports
5.2. Trustworthiness Development Specification for Spacecraft Software Based on Factory Reports
5.3. Trustworthiness Improvement Specification for Spacecraft Software Based on Factory Reports
6. Discussion
7. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- He, J.F.; Shan, Z.G.; Wang, J.; Pu, G.G.; Fang, Y.F.; Liu, K.; Zhao, R.Z.; Zhang, Z.T. Review of the Achievements of Major Research Plan of Trustworthy Software. Bull. Natl. Nat. Sci. Found. China 2018, 32, 291–296. [Google Scholar]
- Jin, Z.H. Fatal Bug: The Disaster and Enlightenment of Software Defects; People’s Posts and Telecommunications Press: Beijing, China, 2016. [Google Scholar]
- Chen, Y.X.; Tao, H.W. Software Trustworthiness Measurement Evaluation and Enhancement Specification; Science Press: Beijing, China, 2019. [Google Scholar]
- Tao, H.W.; Chen, Y.X.; Wu, H.Y.; Deng, R.M. A Survey of Software Trustworthiness Measurements. Int. J. Perform. Eng. 2019, 15, 2364–2372. [Google Scholar]
- Deng, R.M.; Chen, Y.X.; Wu, H.Y.; Tao, H.W. Software Trustworthiness Evaluation using Structural Equation Modeling. Int. J. Perform. Eng. 2019, 15, 2628–2635. [Google Scholar]
- Alarcon, G.M.; Militello, L.G.; Ryan, P.; Jessup, S.A.; Calhoun, C.S.; Lyons, J.B. A Descriptive Model of Computer Code Trustworthiness. J. Cogn. Eng. Dec. Mak. 2017, 11, 107–121. [Google Scholar] [CrossRef]
- Basso, T.; Silva, H.; Moraes, R. On the Use of Quality Models to Characterize Trustworthiness Properties. In Proceedings of the International Workshop on Software Engineering for Resilient Systems, Naples, Italy, 17 September 2019; pp. 147–155. [Google Scholar]
- Alarcon, G.M.; Ryan, T.J. Trustworthiness Perceptions of Computer Code: A Heuristic-Systematic Processing Model. In Proceedings of the 51st Hawaii International Conference on System Sciences, Waikoloa Village, HI, USA, 2–6 January 2018; pp. 5384–5393. [Google Scholar]
- Lv, Z.H.; Han, Y.; Singh, K.A.; Manogaran, G.; Lv, H.B. Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence. IEEE Trans. Industr. Inform. 2021, 17, 1496–1504. [Google Scholar]
- Lemes, C.I.; Naessens, V.; Vieira, M. Trustworthiness Assessment of Web Applications: Approach and Experimental Study Using Input Validation Coding Practices. In Proceedings of the 30th International Symposium on Software Reliability Engineering (ISSRE), Berlin, Germany, 28 October–1 November 2019; pp. 435–445. [Google Scholar]
- Medeiros, N.; Ivaki, N.; Costa, P.; Vieira, M. Vulnerable Code Detection Using Software Metrics and Machine Learning. IEEE Access 2020, 8, 219174–219198. [Google Scholar] [CrossRef]
- Medeiros, N.; Ivaki, N.; Costa, P.; Vieira, M. An Approach for Trustworthiness Benchmarking Using Software Metrics. In Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Taipei, Taiwan, 4–7 December; pp. 84–93.
- Tao, H.W.; Zhao, J. An Improved Attributes-Based Software Trustworthiness Metric Model. J. Wuhan Univ. 2017, 63, 151–157. [Google Scholar]
- Tao, H.W.; Chen, Y.X.; Wu, H.Y. Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches. In Proceedings of the 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China, 11–14 December 2020; pp. 308–315. [Google Scholar]
- Liu, H.; Tao, H.W.; Chen, Y.X. An Approach for Trustworthy Evidence of Source Code Oriented Aerospace Software Trustworthiness Measurement. AER Control Appl. 2021, 47, 32–41. [Google Scholar]
- Khan, S.; Jha, S.K.; Khatri, S.K. Dependability and Trustworthiness Analysis for Component Based Software Development. Int. J. Rec. Techn. Eng. 2019, 8, 2277–3878. [Google Scholar]
- Jabeen, G.; Ping, L. A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index. In Proceedings of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, Rotorua, New Zealand, 5–8 August 2019; pp. 18–25. [Google Scholar]
- Muhammad, D.M.S.; Fairul, R.F.; Loo, F.A.; Nur, F.A.; Norzamzarini, B. Rating of Software Trustworthiness Via Scoring of System Testing Results. Int. J. Dig. Enterp. Technol. 2018, 1, 121–134. [Google Scholar]
- Wang, D.X.; Wang, Q.; He, J. Evidence-based Software Process Trustworthiness Model and Evaluation Method. J. Softw. 2017, 28, 1713–1731. [Google Scholar]
- Ogunniye, G.; Legastelois, B.; Rovatsos, M.; Dowthwaite, L.; Portillo, V.; Vallejos, E.P.; Zhao, J.; Jirotka, M. Understanding User Perceptions of Trustworthiness in E-recruitment Systems. IEEE Internet Comput. 2021, 25, 23–32. [Google Scholar] [CrossRef]
- Shi, H.L.; Ma, J.; Zou, F.Y. A Fuzzy Comprehensive Evaluation Model for Software Dependability based on Entropy Weight. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Wuhan, China, 12–14 December 2008; pp. 683–685. [Google Scholar]
- Li, B.; Cao, Y. An Improved Comprehensive Evaluation Model of Software Dependability based on Rough Set Theory. J. Soft. 2009, 4, 1152–1159. [Google Scholar] [CrossRef]
- Zhang, F.; Xu, M.D.; Chao, H.C.; Zhang, C.; Liu, X.L.; Hu, F.N. Real-time Trust Measurement of Software: Behavior Trust Analysis Approach based on Noninterference. J. Softw. 2019, 30, 2268–2286. [Google Scholar]
- Tian, F.; Guo, Y.H. Software Trustworthiness Evaluation Model based on Behavior Trajectory Matrix. Inform. Softw. Technnol. 2020, 119, 106–233. [Google Scholar]
- Ji, C.Y.; Su, X.; Qin, Z.F.; Nawaz, A. Probability Analysis of Construction Risk based on Noisy-or Gate Bayesian Networks. Rel. Eng. Syst. Saf. 2022, 217, 107974. [Google Scholar] [CrossRef]
- Ogundoyin, S.O.; Kamil, I.A. A Fuzzy-AHP based Prioritization of Trust Criteria in Fog Computing Services. Appl. Soft Comput. 2020, 97, 106789. [Google Scholar] [CrossRef]
- Sahu, K.; Srivastava, R.K. Soft Computing Approach for Prediction of Software Reliability. ICIC Express Lett. 2018, 12, 1213–1222. [Google Scholar]
- Sahu, K.; Srivastava, R.K. Revisiting Software Reliability. In Book Data Management, Analytics and Innovation, Advances in Intelligent Systems and Computing; Balas, V., Sharma, N., Chakrabarti, A., Eds.; Springer: Singapore, 2019; Volume 808, pp. 221–235. [Google Scholar]
- Al-Mejibli, I.S.; Alharbe, N.R. A Fuzzy Analytic Hierarchy Process for Security Risk Assessment of Web Based Hospital Management System. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 2470–2474. [Google Scholar] [CrossRef]
- Marshall, A.M. Digital Forensic Tool Verification: An Evaluation of Options for Establishing Trustworthiness. Forensic Sci. Int.: Digit. Investig. 2021, 38, 301181. [Google Scholar] [CrossRef]
- Maza, S.; Megouas, O. Framework for Trustworthiness in Software Development. Int. J. Perf. Eng. 2021, 17, 241–252. [Google Scholar] [CrossRef]
- Buraga, S.C.; Amariei, D.; Dospinescu, O. An OWL-Based Specification of Database Management Systems. Comput. Mater. Cont. 2022, 70, 5537–5550. [Google Scholar] [CrossRef]
- Riehle, R.D.; Michael, J.B. Improving the Trustworthiness of Software Through Rigorous Data Type Design. Computer 2021, 54, 89–95. [Google Scholar] [CrossRef]
- Xu, Z.S. Research on Software Trustworthiness Measurement Evaluation Model based on Data Driven. In Proceedings of the 2nd International Conference on Computer Science Communication and Network Security (CSCNS2020), Sanya, China, 22–23 December 2020; pp. 1–4. [Google Scholar]
- Novikova, E.; Doynikova, E.; Gaifulina, D.; Kotenko, I. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics. Electronics 2022, 11, 234. [Google Scholar] [CrossRef]
- Alzahari, S.; Kamalrudin, M. An Approach to Elicit Trustworthiness Requirements in Blockchain Technology. J. Phys. Conf. Ser. 2021, 1807, 012031. [Google Scholar] [CrossRef]
- Choudhary, C.; Kapur, P.K.; Khatri, S.K.; Majumdar, R. Software Quality and Reliability Improvement in Open Environment. In Book Advances in Interdisciplinary Research in Engineering and Business Management: Asset Analytics (Performance and Safety Management); Kapur, P.K., Singh, G., Panwar, S., Eds.; Springer: Singapore, 2021; pp. 263–276. [Google Scholar]
- Ma, Y.J.; Chen, Y.X.; Gu, B. An Attributes-Based Allocation Approach of Software Trustworthy Degrees. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security Companion, Vancouver, BC, Canada, 3–5 August 2015; pp. 89–94. [Google Scholar]
- Tao, H.W.; Chen, Y.X.; Wu, H.Y. A Reallocation Approach for Software Trustworthiness Based on Trustworthy Attributes. Mathematics 2020, 8, 14. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Chen, Y.X.; Gu, B.; Guo, X.Y.; Wang, B.H.; Jin, S.Y.; Xu, J.; Zhang, J.Y. An Approach to Measuring and Grading Software Trust for Spacecraft Software. Sci. Sin. Technol. 2015, 45, 221–228. [Google Scholar]
- Kitchenham, B.; Pflfleeger, S.L.; Fenton, N. Towards a Framework for Software Measurement Validation. IEEE Trans. Softw. Eng. 1995, 21, 929–943. [Google Scholar] [CrossRef] [Green Version]
- Briand, L.C.; Morasca, S.; Basili, R.V. Property-based Software Engineering Measurement. IEEE Trans. Softw. Eng. 1996, 22, 68–86. [Google Scholar] [CrossRef] [Green Version]
- Tao, H.W.; Wu, H.Y.; Chen, Y.X. An Approach of Trustworthy Measurement Allocation Based on Sub-Attributes of Software. Mathematics 2019, 7, 237. [Google Scholar] [CrossRef] [Green Version]
Software Trustworthiness Measurement Requirements | Trustworthy Attribute Requirements | Trustworthy Level |
---|---|---|
| V | |
or and cannot be rated as level V |
| IV |
or and cannot be rated as level IV or above |
| III |
or and cannot be rated as level III or above |
| II |
or and cannot be rated as level II or above | No trustworthy attribute with a value less than 1 | I |
Attribute | AttributeWeight | Sub-Attribute | Sub-AttributeWeight |
---|---|---|---|
Overall planning and implementation | 0.05 | Development planning and execution | 0.31 |
Functionality and performance compliance with specification | 0.36 | ||
Integrity of software development documentation | 0.33 | ||
Analysis and design | 0.17 | Input file controlled condition | 0.33 |
Requirement analysis | 0.33 | ||
Software design | 0.34 | ||
Test verification | 0.20 | Test plan and implementation | 0.16 |
Code walk through and static analysis | 0.17 | ||
Test content comprehensiveness | 0.17 | ||
Special testing situation | 0.17 | ||
Test coverage | 0.17 | ||
Test environment, methods and tool usage | 0.16 | ||
Reliability and safety | 0.15 | Reliability and safety analysis | 0.33 |
Reliability and safety design | 0.34 | ||
Reliability and safety verification | 0.33 | ||
Software technology status change | 0.09 | Basis, demonstration and approval of technical status change | 0.34 |
Test and verification after changes | 0.33 | ||
Implementations after changes | 0.33 | ||
Quality problem close loop | 0.09 | Quality problem zero completion | 0.50 |
Implementation of one example against three tasks | 0.50 | ||
Configuration management | 0.11 | Configuration management organization, requirements, and tools | 0.33 |
Change control situation | 0.34 | ||
Configuration audit, documentary | 0.33 | ||
Software development environment | 0.05 | Development supporting software | 0.50 |
Development supporting hardware | 0.50 | ||
Third party evaluation situation | 0.09 | Evaluation input and evaluation plan situation | 0.33 |
Evaluation of implementation situation | 0.33 | ||
Problem solving situation | 0.34 |
Software Trustworthiness Measurement Requirements | Trustworthy Attribute Requirements | Trustworthy Level |
---|---|---|
| V | |
or and cannot be rated as level V |
| IV |
or and cannot be rated as level IV or above |
| III |
or and cannot be rated as level III or above |
| II |
or and cannot be rated as level II or above | No trustworthy attribute with a value less than 1 | I |
Attribute | No. 2 | No. 4 | No. 6 | No. 7 | No. 9 | No. 18 | No. 19 | No. 20 | No. 21 | No. 22 | No. 23 |
---|---|---|---|---|---|---|---|---|---|---|---|
Overall planning and implementation | 8.28 | 7.66 | 7.66 | 7.66 | 7.66 | 8.33 | 8.33 | 7.00 | 8.33 | 8.33 | 9.00 |
Analysis and design | 7.61 | 7.61 | 7.87 | 7.87 | 7.87 | 7.61 | 7.61 | 7.61 | 7.87 | 7.87 | 7.61 |
Test verification | 6.13 | 4.76 | 5.90 | 6.15 | 7.94 | 8.41 | 9.16 | 8.28 | 8.20 | 5.99 | 8.40 |
Reliability and safety | 8.26 | 7.61 | 7.00 | 4.63 | 7.00 | 9.00 | 8.28 | 7.61 | 7.00 | 7.00 | 9.00 |
Software technology status change | 8.28 | 8.26 | 8.26 | 8.26 | 8.26 | 8.28 | 8.26 | 7.61 | 9.00 | 9.00 | 8.58 |
Quality problem close loop | 8.37 | 8.37 | 8.37 | 8.37 | 7.93 | 9.49 | 8.37 | 8.37 | 8.37 | 8.37 | 8.37 |
Configuration management | 9.00 | 9.00 | 7.00 | 7.62 | 8.28 | 10.00 | 9.66 | 8.59 | 8.59 | 8.59 | 10.00 |
Software development environment | 9.00 | 4.24 | 7.00 | 7.00 | 7.94 | 9.00 | 9.00 | 9.49 | 9.00 | 9.00 | 9.00 |
Third party evaluationsituation | 9.65 | 9.37 | 9.65 | 9.65 | 9.64 | 8.26 | 9.00 | 9.00 | 8.56 | 10.00 | 8.26 |
Trustworthy degree | 7.90 | 7.09 | 7.36 | 7.04 | 7.97 | 8.61 | 8.58 | 8.08 | 8.17 | 7.76 | 8.57 |
Trustworthy level | III | II | III | III | III | IV | IV | III | III | III | IV |
Attribute | Attribute Value | Sub-Attribute | Sub-Attribute Level |
---|---|---|---|
Overall planning and implementation | 8.50 | Development planning and execution | C |
Functionality and performance compliance with specification | A | ||
Integrity of software development documentation | B | ||
Analysis and design | 9.68 | Input file controlled condition | A |
Requirement analysis | A | ||
Software design | A | ||
Test verification | 9.72 | Test plan and implementation | A |
Code walk through and static analysis | A | ||
Test content comprehensiveness | A | ||
Special testing situation | A | ||
Test coverage | A | ||
Test environment, methods and tool usage | B | ||
Reliability and safety | 9.65 | Reliability and safety analysis | B |
Reliability and safety design | A | ||
Reliability and safety verification | A | ||
Software technology status change | 9.50 | Basis, demonstration and approval of technical status change | A |
Test and verification after changes | A | ||
Implementations after changes | B | ||
Quality problem close loop | 9.50 | Quality problem zero completion | A |
Implementation of one example against three tasks | A | ||
Configuration management | 9.59 | Configuration management organization, requirements, and tools | A |
Change control situation | A | ||
Configuration audit, documentary | B | ||
Software development environment | 8.50 | Development supporting software | B |
Development supporting hardware | B | ||
Third party evaluation situation | 9.50 | Evaluation input and evaluation plan situation | A |
Evaluation of implementation situation | B | ||
Problem solving situation | A |
Attribute | Attribute Value | Sub-Attribute | Sub-Attribute Level |
---|---|---|---|
Overall planning and implementation | 7.00 | Development planning and execution | C |
Functionality and performance compliance with specification | C | ||
Integrity of software development documentation | C | ||
Analysis and design | 8.78 | Input file controlled condition | B |
Requirement analysis | B | ||
Software design | B | ||
Test verification | 8.85 | Test plan and implementation | B |
Code walk through and static analysis | B | ||
Test content comprehensiveness | B | ||
Special testing situation | B | ||
Test coverage | B | ||
Test environment, methods and tool usage | B | ||
Reliability and safety | 8.73 | Reliability and safety analysis | B |
Reliability and safety design | B | ||
Reliability and safety verification | B | ||
Software technology status change | 8.50 | Basis, demonstration and approval of technical status change | A |
Test and verification after changes | B | ||
Implementations after changes | C | ||
Quality problem close loop | 8.50 | Quality problem zero completion | B |
Implementation of one example against three tasks | B | ||
Configuration management | 8.64 | Configuration management organization, requirements, and tools | B |
Change control situation | B | ||
Configuration audit, documentary | B | ||
Software development environment | 7.00 | Development supporting software | C |
Development supporting hardware | C | ||
Third party evaluation situation | 8.50 | Evaluation input and evaluation plan situation | C |
Evaluation of implementation situation | B | ||
Problem solving situation | A |
Attribute | Attribute Value | Sub-Attribute | Sub-Attribute Level |
---|---|---|---|
Overall planning and implementation | 4.50 | Development planning and execution | C |
Functionality and performance compliance with specification | C | ||
Integrity of software development documentation | C | ||
Analysis and design | 7.54 | Input file controlled condition | C |
Requirement analysis | C | ||
Software design | B | ||
Test verification | 7.67 | Test plan and implementation | C |
Code walk through and static analysis | B | ||
Test content comprehensiveness | B | ||
Special testing situation | C | ||
Test coverage | C | ||
Test environment, methods and tool usage | C | ||
Reliability and safety | 7.45 | Reliability and safety analysis | C |
Reliability and safety design | B | ||
Reliability and safety verification | C | ||
Software technology status change | 7.00 | Basis, demonstration and approval of technical status change | C |
Test and verification after changes | C | ||
Implementations after changes | C | ||
Quality problem close loop | 7.00 | Quality problem zero completion | C |
Implementation of one example against three tasks | C | ||
Configuration management | 7.28 | Configuration management organization, requirements, and tools | C |
Change control situation | B | ||
Configuration audit, documentary | C | ||
Software development environment | 4.50 | Development supporting software | C |
Development supporting hardware | C | ||
Third party evaluation situation | 7.00 | Evaluation input and evaluation plan situation | C |
Evaluation of implementation situation | C | ||
Problem solving situation | C |
Changes of Trustworthy at Tribute Values | No. 4 | Changes of Trustworthy Attribute and Software Trustworthiness Values | No. 4 |
---|---|---|---|
Changes of Trustworthy at Tribute Values | No. 2 | Changes of Trustworthy Attribute and Software Trustworthiness Values | No. 2 |
---|---|---|---|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tao, H.; Fu, L.; Chen, Y.; Han, L.; Wang, X. Improved Allocation and Reallocation Approaches for Software Trustworthiness Based on Mathematical Programming. Symmetry 2022, 14, 628. https://doi.org/10.3390/sym14030628
Tao H, Fu L, Chen Y, Han L, Wang X. Improved Allocation and Reallocation Approaches for Software Trustworthiness Based on Mathematical Programming. Symmetry. 2022; 14(3):628. https://doi.org/10.3390/sym14030628
Chicago/Turabian StyleTao, Hongwei, Lianyou Fu, Yixiang Chen, Lin Han, and Xiao Wang. 2022. "Improved Allocation and Reallocation Approaches for Software Trustworthiness Based on Mathematical Programming" Symmetry 14, no. 3: 628. https://doi.org/10.3390/sym14030628
APA StyleTao, H., Fu, L., Chen, Y., Han, L., & Wang, X. (2022). Improved Allocation and Reallocation Approaches for Software Trustworthiness Based on Mathematical Programming. Symmetry, 14(3), 628. https://doi.org/10.3390/sym14030628