Abstract
With the development of Internet technology, a lot of software assets emerge on the Internet, but it is difficult to predict or control the quality of these software assets. Therefore, an effective asset retrieval mechanism is needed to select and reuse trustworthy software assets. In this paper, we introduce the idea of trust management into Software Asset Repository (SAR) and propose a framework for trust-enabled software assets retrieval. The framework decomposes trust management into evidence collection, trust evaluation, trust recommendation and asset retrieval support, supporting dynamical and personalized asset trustworthiness evaluation and retrieval in SAR. We present the experiments of this framework in Trusted Software Asset Repository of Peking University, and a case study is given in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems (2006)
ComponentSource, http://www.componentsource.com/
SourceForge, http://www.sourceforge.net/
IEEE standard for information technology -software reuse - data model for reusable library interoperability: Basic interoperability data model (BIDM). IEEE std. 1420.1 (1995)
UDDI Version 3.0, UDDI Specification Technical Committee Specification
Reusable Asset Specification, OMG Adopted Specification, ptc/04-06-06 (2004), http://www.omg.org/issues/
The Electronic Industry Standard of china SJ/T 11371-2007, Software component management - The first part - Management information model (published in November 2007), put in practice (January 2008)
McCarey, F., Cinnéide, M.Ó., Kushmerick, N.: Recommending Library Methods- An Evaluation of the Vector Space Model (VSM) and Latent Semantic Indexing. In: The 8th International Conference on Software Reuse, Torino, Italy, pp. 217–230 (June 2006)
Mockus, A., Herbsleb, J.D.: Expertise Browser: A quantitative approach to identifying expertise. In: Proceedings of the International Conference on Software Engineering, pp. 503–512 (2002)
Ye, Y., Fischer, G.: Reuse conductive development environments. Automated Software Engineering 12(2), 199–235 (2005)
Cubranic, D., Murphy, G.C.: Hipikat: A Project Memory for Software Development. IEEE Transactions on Software Engineering 31(6), 446–464 (2005)
Zhao, W., Varadharajan, V.: Trust Management for Web Services. In: IEEE International Conference on Web Services, pp. 819–821 (2008)
Sarma, A., Maccherone, L., Wagstrom, P., Herbsleb, J.: Tesseract: Interactive Visual Exploration of Socio-Technical Relationships in Software Development. In: IEEE 31st International Conference on Software Engineering,Vancouver, BC, Canada (2009)
Cai, S., Zou, Y., Shao, L., Xie, B., Shao, W.: A Framework Supporting Software Assets Evaluation on Trustworthiness. Journal of Software 21(2), 359–372 (2010)
Fan, J., Kambhampati, S.: A Snapshot of Public Web Services. ACM SIGMOD Record 34(1), 24–32 (2005)
Chang, E., Dillon, T.S., Hussain, F.K.: Trust and reputation relationships in service-oriented environments. In: Proceeding of the Third International Conference on Information Technology and Applications (ICITA), pp. 4–14 (2005)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceeding of the 1996 IEEE Symp. On Security and Privacy, Washington, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)
Grandison, T.W.A.: Trust Management for Internet Applications. Department of Computing. London, University of London. Ph.D thesis (2003)
Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, pp. 48–60 (1997)
Jøsang, A., Gray, L., Kinateder, M.: Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems Journal 4(2), 139–161 (2006)
Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
http://www.microsoft.com/mscorp/twc/twc_whitepaper.mspx (2002)
ISO/IEC 9126-1:2001 Software engineering - Product quality - Part 1: Quality model, http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=22749
Wang, D.: Research on Trust Model and Trust-based Application for Grid Computing. Institute of Computing Technology, Chinese Academy of Science, Beijing, China. Ph.D thesis (2006)
Standifird, S.S.: Reputation and E-commerce: eBay Auctions and the Asymmetrical Impact of Positive and Negative Ratings. Journal of Management 27, 279–295 (2001)
Xu, F., Lv, J., Zheng, W., Cao, C.: Design of a trust valuation model in software service coordination. Journal of Software (in Chinese with English Abstract) 14(6), 1043–1051 (2003)
Wang, Y., Lv, J., Xu, F., Zhang, L.: A Trust Measurement and Evolution Model for Internetware. Journal of Software 17(4), 682–690 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zou, Y., Cai, S., Li, M., Wang, L., Xie, B. (2010). A Framework for Trust Enabled Software Asset Retrieval. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)