Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu
{"title":"A Petri Net Based Model for Trustworthy Software Process Composition","authors":"Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu","doi":"10.1109/COMPSACW.2013.37","DOIUrl":null,"url":null,"abstract":"The growing demand for higher trustworthiness of software poses an unprecedented challenge to the software industry. Software is the outcome of the software process. Software trustworthiness is highly dependent on the software process. To combine the trustworthiness in the software process, we propose a formal method for trustworthy software process composition. In this method, trustworthy processes are specified by the trustworthiness requirements and compose into software process. The composite process satisfies both functional and non-functional requirements for the trustworthy software.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSACW.2013.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The growing demand for higher trustworthiness of software poses an unprecedented challenge to the software industry. Software is the outcome of the software process. Software trustworthiness is highly dependent on the software process. To combine the trustworthiness in the software process, we propose a formal method for trustworthy software process composition. In this method, trustworthy processes are specified by the trustworthiness requirements and compose into software process. The composite process satisfies both functional and non-functional requirements for the trustworthy software.