A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A Subjective Metric of Authentication
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Integrity Management in Component Based Systems
EUROMICRO '04 Proceedings of the 30th EUROMICRO Conference
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
A fuzzy model for reasoning about reputation in web services
Proceedings of the 2006 ACM symposium on Applied computing
A First Course in Fuzzy Logic, Third Edition
A First Course in Fuzzy Logic, Third Edition
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
MAPbox: using parameterized behavior classes to confine untrusted applications
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Trust-based protection of software component users and designers
iTrust'03 Proceedings of the 1st international conference on Trust management
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Component engineering for adaptive ad-hoc systems
Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities
Trust in Agent Societies
On runtime service quality models in adaptive ad-hoc systems
Proceedings of the 2009 ESEC/FSE workshop on Software integration and evolution @ runtime
Approaching runtime trust assurance in open adaptive systems
Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
Toward a trust management model for a configurable body sensor platform
Proceedings of the 6th International Conference on Body Area Networks
Conditional Safety Certification of Open Adaptive Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
Component-based systems use software components to achieve their overall high-level functionality which, in turn, may be extended by initiating the download of new components. This action may detrimentally affect the system's overall dependability and security characteristics. We address the problem of the enhancement of dependability and security for component-based embedded systems that run, for example, in consumer and embedded electronics devices. We propose a Trustworthiness Management Framework which, while acting on the behalf of components (Trustors), supervises the system's existing Trustor-Trustee relationships and preserves the overall system level of dependability and security. This is achieved by monitoring quality metrics on the components behaviours, by periodically evaluating their trustworthiness, and (when applicable) by controlling them. This paper focuses on the trustworthiness evaluation process offered by the Trustworthiness Management Framework. Trustworthiness evaluation is seen as a Trustors-parameterisable function. Trustworthiness is expressed with a triple of values: compliance, benignity and stability. The first measures the degree to which a component satisfies the Trustor's requirement; the second and third express the expected belief that, resp., the components will continue to be compliant and the component's behavioural qualities will remain stable. Trustworthiness is used by the Trustworthiness Manager Framework to make control decisions to regulate the system's overall dependability and security characteristics. Keywords: component-based systems, trustworthiness evaluation, trustworthiness management architecture, dependability and security.