Skip to main content

Representing Confidence in Assurance Case Evidence

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9338))

Abstract

When evaluating assurance cases, being able to capture the confidence one has in the individual evidence nodes is crucial, as these values form the foundation for determining the confidence one has in the assurance case as a whole. Human opinions are subjective, oftentimes with uncertainty—it is difficult to capture an opinion with a single probability value. Thus, we believe that a distribution best captures a human opinion such as confidence. Previous work used a doubly-truncated normal distribution or a Dempster-Shafer theory-based belief mass to represent confidence in the evidence nodes, but we argue that a beta distribution is more appropriate. The beta distribution models a variety of shapes and we believe it provides an intuitive way to represent confidence. Furthermore, there exists a duality between the beta distribution and subjective logic, which can be exploited to simplify mathematical calculations. This paper is the first to apply this duality to assurance cases.

This work has been partially supported by NSF grants CNS-0931931 and CNS-1035715.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Safety management requirements for defence systems. Defence Standard 00–56 4, Ministry of Defense (2007)

    Google Scholar 

  2. Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Advances in Systems Safety (2011)

    Google Scholar 

  3. Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: 2011 International Symposium on Empirical Software Engineering and Measurement (2011)

    Google Scholar 

  4. Fenton, N., Neil, M., Caballero, J.G.: Using ranked nodes to model qualitative judgements in Bayesian networks. In: IEEE Transactions on Knowledge and Data Engineering (2007)

    Google Scholar 

  5. Ayoub, A., Chang, J., Sokolsky, O., Lee, I.: Assessing the overall sufficiency of safety arguments. In: Safety-Critical Systems Club (2013)

    Google Scholar 

  6. Jøsang, A.: Artificial reasoning with subjective logic. In: Proceedings of the Second Australian Workshop on Commonsense Reasoning (1997)

    Google Scholar 

  7. Cyra, L., G\(\acute{o}\)rski, J.: Supporting expert assessment of argument structures in trust cases. In: 9th International Probability Safety Assessment and Management Conference PSAM (2008)

    Google Scholar 

  8. Duan, L., Rayadurgam, S., Heimdahl, M., Ayoub, A., Sokolsky, O., Lee, I.: Reasoning about confidence and uncertainty in assurance cases: a survey. In: Software Engineering in Health Care (2014)

    Google Scholar 

  9. Kerr, O.: Why courts should not quantify probable cause. In: Klarman, S., Steiker (eds.) The Political Heart of Criminal Procedure: Essays on Themes of William J. Stuntz. GWU Law School Public Law Research Paper No. 543 (2012)

    Google Scholar 

  10. Druzdzel, M.J., van der Gaag, L.C.: Elicitation of probabilities for belief networks: combining qualitative and quantitative information. In: UAI 1995 Proceedings of the Eleventh Conference on Uncertainty in Artificial Intellingence (1995)

    Google Scholar 

  11. AgenaRisk. http://www.agenarisk.com/products/free_download.shtml

  12. Hobbs, C., Lloyd, M.: The application of Bayesian belief networks to assurance case preparation. In: Achieveing Systems Safety: Proceedings of the Twentieth Safety-Critical Systems Symposium (2012)

    Google Scholar 

  13. Cozman, F.: Axiomatizing noisy-or. In: Proceedings of the 16th European Conference on Artificial Intelligence (2004)

    Google Scholar 

  14. Toulmin, S.: The Uses of Argument. Cambridge University Press, Cambridge (1958)

    Google Scholar 

  15. NOR-STA. https://www.argevide.com/en/products/free_trial

  16. Górski, J., Jarzębowicz, A., Miler, J., Witkowicz, M., Czyżnikiewicz, J., Jar, P.: Supporting assurance by evidence-based argument services. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol. 7613, pp. 417–426. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Choi, W., Kurfess, T.R., Cagan, J.: Sampling uncertainty in coordinate measurement data analysis. Precis. Eng. 22, 153–163 (1998)

    Article  Google Scholar 

  18. Merkle, E.: The disutility of the hard-easy effect in choice confidence. Psychon. Bull. Rev. 16(1), 204–213 (2009)

    Article  Google Scholar 

  19. Bishop, P., Bloomfield, R., Littlewood, B., Povyakalo, A., Wright, D.: Towards a formalism for conservative claims about the dependability of software-based systems. IEEE Trans. Softw. Eng. 37(5), 708–717 (2011)

    Article  Google Scholar 

  20. Jøsang, A., Haller, J.: Dirichlet reputation systems. In: Proceedings of the 2nd International Conference on Availability, Reliability and Security (2007)

    Google Scholar 

  21. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: 29th Australasian Computer Science Conference (2006)

    Google Scholar 

  22. Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings fo the Workshop on Trust in Agent Societies, at the Autonomous Agents and Multi Agent Systems Conference (2004)

    Google Scholar 

  23. Ettler, P., Dedecius, K.: Probabilistic reasoning in service of condition monitoring. In: Proceedings of the 11th International Conference on Condition Monitoring and Machinery Failure Prevention Technologies (2014)

    Google Scholar 

  24. Han, S., Koo, B., Hutter, A., Stechele, W.: Forensic reasoning upon pre-obtained surveillance metadata using uncertain spatio-temporal rules and subjective logic. In: 2010 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), pp. 1–4 (2010)

    Google Scholar 

  25. Chilenski, J., Miller, S.: Applicability of modified condition/decision coverage to software testing. Softw. Eng. J. 9, 193–200 (1994)

    Article  Google Scholar 

  26. Renooij, S.: Probability elicitation for belief networks: issues to consider. Knowl. Eng. Rev. 16, 255–269 (2001)

    Article  Google Scholar 

  27. O’Hagan, A.: Eliciting expert beliefs in substantial practical applications. J. Roy. Stat. Soc. Series D (Stat.) 47, 21–35 (1998)

    Article  Google Scholar 

  28. van der Gaag, L.C., Renooij, S., Witteman, C., Aleman, B.M.P., Taal, B.G.: How to elicit many probabilities. CoRR abs/1301.6745 (2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lian Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Duan, L., Rayadurgam, S., Heimdahl, M.P.E., Sokolsky, O., Lee, I. (2015). Representing Confidence in Assurance Case Evidence. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9338. Springer, Cham. https://doi.org/10.1007/978-3-319-24249-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24249-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24248-4

  • Online ISBN: 978-3-319-24249-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics