Software Testing is Necessary But Not Sufficient for Software Trustworthiness

Research output: Contribution to Book/Report typesContribution to conference proceedingspeer-review

1 Citation (Scopus)

Abstract

In the past decades, software verification generally was about 40-50% of the total development costs of any software system [12], yet few users are satisfied with reliability of their software. Even though the quality assurance budgets of software makers are increasing, program failures with possible data loss happens quite often. This paper investigates the reasons why software testing is not enough for assuring software trustworthiness and is a follow up of previous study on finding a way to model software trustworthiness by using Finite State Machine (FSM) and scenarios [1]. The approach uses the novel behavioristic model for verifying software trustworthiness based on scenarios of interactions between the software and its users and environment presented in our previous paper [1]. The approach consists of interactions of examples or counterexamples of desired behavior and supports incremental changes in requirements or scenarios.

Original languageEnglish
Title of host publicationTrustworthy Computing and Services - International Conference, ISCTCS 2012, Revised Selected Papers
PublisherSpringer Verlag
Pages34-44
Number of pages11
ISBN (Print)9783642357947
DOIs
Publication statusPublished - 2013
EventInternational Conference on Trustworthy Computing and Services, ISCTCS 2012 - Beijing, China
Duration: 28 May 20122 Jun 2012

Publication series

NameCommunications in Computer and Information Science
Volume320
ISSN (Print)1865-0929

Conference

ConferenceInternational Conference on Trustworthy Computing and Services, ISCTCS 2012
Country/TerritoryChina
CityBeijing
Period28/05/122/06/12

!!!Keywords

  • Quality
  • Security
  • Software
  • Trustworthiness

Fingerprint

Dive into the research topics of 'Software Testing is Necessary But Not Sufficient for Software Trustworthiness'. These topics are generated from the title and abstract of the publication. Together, they form a unique fingerprint.

Cite this