Skip to main content

On the Use of Quality Models to Characterize Trustworthiness Properties

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11732))

Abstract

Making informed choices when designing or contracting a system is yet a very challenging task. One of the biggest users’ concern is to select the most trustworthy solution. However, it is difficult to understand the trustworthiness of a system, because it encompasses a large diversity of properties such as security, privacy, performance, among others. Composing a measure that considers such a large number of properties, the relationship among them and their relevance in the composition requires a well defined model, such as a quality model. In this experience report, we study whether quality models can provide scores that are useful to characterize those properties, helping users to choose the most trustworthy of the available alternatives. Then, we have chosen a property that is on the top of users concerns: data privacy. Results showed a higher percentage of success of linkage attacks when the privacy score is lower, indicating the usefulness of quality models in measuring and improving data privacy and providing interesting insights to the users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.iiconsortium.org.

  2. 2.

    https://www.atmosphere-eubrazil.eu/.

  3. 3.

    https://arx.deidentifier.org/.

  4. 4.

    https://archive.ics.uci.edu/ml/datasets.html.

  5. 5.

    https://www.figure-eight.com/.

References

  1. Basso, T., Matsunaga, R., Moraes, R., Antunes, N.: Challenges on anonymity, privacy, and big data. In: 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), pp. 164–171. IEEE (2016)

    Google Scholar 

  2. Dujmovic, J., Elnicki, R.: A DMS cost/benefit decision model: mathematical models for data management system evaluation, comparison, and selection, pp. 82–374. National Bureau of Standards, Washington DC, No. GCR (1982)

    Google Scholar 

  3. Friginal, J., Martínez, M., de Andres, D., Ruiz, J.C.: Multi-criteria analysis of measures in benchmarking: dependability benchmarking as a case study. J. Syst. Softw. 111, 105–118 (2016)

    Article  Google Scholar 

  4. Henschke, A., Ford, S.B.: Cybersecurity, trustworthiness and resilient systems: guiding values for policy. J. Cyber Policy 2(1), 82–95 (2017)

    Article  Google Scholar 

  5. ISO/IEC: Software product quality requirements and evaluation - SQUARE. User guide. ISO/IEC (2005)

    Google Scholar 

  6. International Organization for Standardization: When the world agrees (ISO/IEC) (2014). https://www.iso.org/standard/64764.html

  7. Kort, S., Rudina, E.: The resilience model supporting IIoT system trustworthiness. IIC J. Innov. 1(1), 1–16 (2018)

    Google Scholar 

  8. Kreutz, D., Feitosa, E., Cunha, H., Niedermayer, H., Kinkelin, H.: Increasing the resilience and trustworthiness of openid identity providers for future networks and services. In: 2014 Ninth International Conference on Availability, Reliability and Security, pp. 317–324. IEEE (2014)

    Google Scholar 

  9. Medeiros, N.P.D.S., Ivaki, N.R., Da Costa, P.N., Vieira, M.P.A.: Towards an approach for trustworthiness assessment of software as a service. In: 2017 IEEE International Conference on Edge Computing (EDGE), pp. 220–223. IEEE (2017)

    Google Scholar 

  10. Mei, H., Huang, G., Xie, T.: Internetware: a software paradigm for internet computing. Computer 45(6), 26–31 (2012)

    Article  Google Scholar 

  11. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by the ATMOSPHERE project, funded by Brazilian MCTI/RNP and by the European Commission under the Horizon 2020 grant agreement.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tania Basso , Hebert Silva or Regina Moraes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Basso, T., Silva, H., Moraes, R. (2019). On the Use of Quality Models to Characterize Trustworthiness Properties. In: Calinescu, R., Di Giandomenico, F. (eds) Software Engineering for Resilient Systems. SERENE 2019. Lecture Notes in Computer Science(), vol 11732. Springer, Cham. https://doi.org/10.1007/978-3-030-30856-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30856-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30855-1

  • Online ISBN: 978-3-030-30856-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics