期刊文献+

基于证据的可信软件过程评估方法 被引量:5

Evidence-Based Trustworthy Software Process Assessment Method
下载PDF
导出
摘要 现有软件过程可信性评估方法中,评估结果往往基于评估人员的主观经验,其准确性和客观性无法得到保证。为解决这个问题,提出了一种基于证据的可信软件过程评估方法(evidence-based trustworthy software process assessment method,EB-TSPAM)。该方法以可信软件过程管理研究成果为基础,度量过程数据,生成软件过程可信性评估证据,并基于证据对软件过程进行可信性评估,达到加强有效过程管理的目的。以软件开发过程中的实际数据作为评估基础,全面考虑软件过程中影响可信性的各种因素,避免了由评估人员主观判断对评估结果产生的负面影响,保证了最终评估结果的准确性、客观性和全面性。 Among the existing assessment methods for trustworthy software process, the results are largely based on assessors' knowledge and experience, which will compromise the objectivity of those results. To address this problem, an evidence-based trustworthy software process assessment method (EB-TSPAM) is proposed. Based on previous research results of trustworthy software process management, by measuring the practical process data and converting them into evidences for assessment, EB-TSPAM assesses the trustworthiness of software process based on evidences, which fulfills the goal of management enhancement. The method is based on practical process data during the software development and takes various factors influencing software trustworthiness into consideration. In this way, EB-TSPAM can avoid individual biases on assessment results and eventually guarantee the objectivity and completeness of the assessment results.
出处 《计算机科学与探索》 CSCD 2011年第6期501-512,共12页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.90718042 国家重点基础研究发展规划(973)No.2007CB310802 国家高技术研究发展计划(863)No.2007AA010303 2007AA01Z186~~
关键词 可信软件 软件过程可信性 可信过程评估 基于证据 trustworthy software software process trustworthiness trustworthy process assessment evidence-based
  • 相关文献

参考文献2

二级参考文献4

共引文献5

同被引文献66

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4郭树行,兰雨晴,金茂忠.软件构件的可信保证研究[J].计算机科学,2007,34(5):243-246. 被引量:14
  • 5Office for Official Publications of the European Communities.Information Technology Security Evaluation Criteria, version1.2.1991.
  • 6The National Information Assurance Partnership. The Com-mon Criteria for Information Technology Security Evaluation.http://vVww.niap-ccevs.org/Documents_and_Guidance/cc_docs_cfm.l996.
  • 7US DoD 5200.28-STD,Trusted Computer System EvaluationCriteria. 1985.
  • 8Jones GRFC 3871. http://www.ietf.org/rfc/rfc3871.txt.2004.
  • 9International Standards Organization. ISO 27000, First Edi-tion. 2005.
  • 10RTCA SC-167, EUROCAE WG-12. SoftwareConsiderations in Airborne Systems and EquipmentCertification. 1992.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部