The evaluation of software trustworthiness with FAHP and FTOPSIS methods

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Trustworthy software has attracted increasing concern both in academia and industry in recent years. How to effectively evaluate the trustworthiness is becoming a closed question. This paper models the software trustworthiness evaluation (STE) problem as a multi-criteria decision-making (MCDM) problem, and proposes both an evaluation framework and a practical approach to evaluate the software trustworthiness based on the Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS) methods. FAHP method is utilized to obtain the weights of evaluation criteria. The FTOPSIS method is used to determine the final ranking of the software alternatives. The uncertainty and vagueness included in evaluation procedure are represented as fuzzy triangular numbers. Finally, the proposed method is applied to the case study of evaluating the trustworthiness of project management (PM) software alternatives for a car manufacturer in China.

Original languageEnglish
Title of host publicationProceedings - 2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009 - Wuhan, China
Duration: 11 Dec 200913 Dec 2009

Publication series

NameProceedings - 2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009

Conference

Conference2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009
Country/TerritoryChina
CityWuhan
Period11/12/0913/12/09

Keywords

  • Evaluation
  • FAHP
  • FTOPSIS
  • PM software
  • Trustworthiness
  • Trustworthy software

Fingerprint

Dive into the research topics of 'The evaluation of software trustworthiness with FAHP and FTOPSIS methods'. Together they form a unique fingerprint.

Cite this