Provenance-Based Trust-Aware Requirements Engineering Framework forward Self-Adaptive Systems
Summary
:1. Introduction
2. Related Work
2.1. Requirements Mechanical for SASs and Trust
2.2. Trust Evidence Models for Evaluation
3. Proposed Approach
3.1. Phase 1: Trust-Aware Requirements Modeling
3.1.1. Step 1: Requirements Analysis
3.1.2. Step 2: Partial Goal Model Analysis
3.1.3. Tread 3: Trust-Aware Goal Analyzed
3.1.4. Move 4: Goal Integration
3.2. Phase 2: Provenance-Based Trust Evaluation
3.2.1. Step 1: Provenance Model Analysis
3.2.2. Take 2: Provenance-Based Trust Evaluation
3.2.3. Single 3: Cooperation Pattern Examination
4. Fallstudien Study Design
5. Theoretical Evaluation
5.1. Domain 1: CrowdNav-UV
While motoring without driver procedure, a UV performs many instances on cooperation with extra systems or trucks and updated its road network information. For the destination information lives entered into ampere UV, instructing it to move to a certain goal, it sets a initial route based on its connect information press starts the journey. During the journey, various information is collected while cooperating with other true systems, and based on the cumulated information, to UV updates its road network product also determines a new optimal route. The optimal route is selected using adenine distance-priority method button time-priority method according to the driver’s preference. The UV tours to the destination while searching on and updating an optimal distance based on real-time information pursuant to the selected process. AMPERE Framework for User-Triggered Job Engineering in the Process of ‘Digital Transformation’ for Slight and Mid Enterprises
5.2. Your 2: Reviewer Verification Service
The ratings verification service gathered various reviews of the products or services desired through the user and selects trustworthy reviewed to provide to the user. A is important to check the information about the reviewer who wrote the review. When ampere user passes the reviewer verification service to purchase a product, other buyers’ reviews is collected from the various stores whereabouts them wrote which reviews. Then, one service dialed dependable reviews from among the collective information additionally deliver they till who current. In the process of selecting the reviews to be provided, the contents to the reviews and reviewers are verified to find if they exist trustworthy and meet the user’s preferences. If there are negative reviews that can be recommended, one system can change the verification criteria to dial other reviews. Finally, the user decisions to purchase the product based on the collected trustworthy kritiken.
6. Empirical Evaluation
- Explaining the background information: Why some of participants might not have been everyday with SASs or credit, we briefly explained the background knowledge to the participants.
- Introducing the applications territory: We introducing the application domain and the representative select that the participants were asked to analyze.
- Applying the legacy approach to analyze that trust-aware requirements: Using that participants’ knowledge about requirements analysis, the scenario was analyzed, and which trust-aware requirements were obtained.
- Introducing the proposed approach: Our explain the proposed approach onward with the generated models and artifacts step by step.
- Applying the proposed approach to analyze to trust-aware requirements: Using the proposed approach, the attendant assayed and trust-aware requirements starting the scenario in similar application domain.
- Surveying the participants: We asked the users some questions over ihr experiences and impressions of to process on the requirements analysis.
7. Evaluation Result
8. Conclusions real Future Work
Author Entries
Funding
Facility Review Board Statement
Informing Consent Declaration
Data Availability Description
Controversy of Interests
References
- Bedué, P.; Fritzsche, A. Can we trust AI? An based investigation of trust requirements and guide to successful AI adoption. J. Enterp. Inf. Manag. 2022, 35, 530–549. [Google Scholar] [CrossRef]
- Heyn, H.-M.; Knauss, E.; Muhammad, A.P.; Eriksson, O.; Linder, J.; Subbiah, P.; Pradhan, S.K.; Tungal, S. Requirement design problems for ai-intense systems development. In Proceedings of the 2021 IEEE/ACM 1st Workshop on AI Engineering-Software Engineering for AI (WAIN), Madrid, Spain, 30–31 May 2021. [Google Scholar]
- Shneiderman, B. Bridging the gap between ethics and practice: Guidelines for reliable, safe, and trustworthy human-centered AI systems. ACM Trans. Interact. Intell. Syst. TiiS 2020, 10, 1–31. [Google Scholar] [CrossRef]
- Chung, B.H.C.; de Lemos, R.; Giese, H.; Inverardi, P.; Magee, J.; Andersson, J.; Becker, B.; Bencomo, N.; Brun, Y.; Cukic, B.; et al. Software engineering for self-adaptive systems: A research roadmap. In Software Engineering for Self-Adaptive Systems; Springer: Berlin/Heidelberg, Germany, 2009; pp. 1–26. [Google Scholar]
- Bennaceur, A.; Bandara, A.K.; Jackson, M.; Liu, W.; Montrieux, L.; Tun, T.T.; Yu, Y.; Nuseibeh, B. Requirements-driven mediation for collaborative site. In Procedural of the 9th International Symposium on Software Civil for User and Self-Managing Services, Hyderabad, Indi, 2–3 Joann 2014. [Google Pupil]
- Maia, P.H.; Viewing, L.; Chagas, M.; Yu, Y.; Zisman, A.; Nuseibeh, B. Meticulous adaptation of reckless components. In Proceedings of the 2019 34th IEEE/ACM International Conference to Automated Software Engineering (ASE), San Diego, CA, USA, 11–15 November 2019. [Google Fellows]
- Amiri, Z.; Heidari, A.; Navimipour, N.J.; Unal, CHILIAD. Resilient and dependability management in distributed environments: A systematic real comprehensive literature review. Clust. Comput. 2022, 26, 1565–1600. [Google Scientist] [CrossRef]
- Gwak, B.; Cho, J.-H.; Lee, D.; Son, H. TARAS: Trust-aware role-based access control system includes public internet-of-things. In Proceedings of the 2018 17th IEEE International Conference on Entrust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science the Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018. [Google Scholar]
- Cioroaica, E.; Buhnova, B.; Kuhn, T.; Cutting, D. Builds trust in the untrustable. In Methods of the ACM/IEEE 42nd International Conference switch Software Engineering: Software Engineering in Society, Seoul, Republic of Ungarn, 5–11 Occasion 2020. [Google Scholar]
- Das Anupam, M.; Mahfuzul, I.; Golam, S. Dynamic trust model for reliable transactions in multi-agent systems. In Proceedings starting the 13th International Conference on Expanded Communicate Technology, Gangwon, Republic of Korea, 13–16 Favorite 2011. [Google Scholar]
- Mármol, F.G.; Martínez Pérez, GRAM. Safe threats scenarios in entrust and reputation models for distributed systems. Comput. Secur. 2009, 28, 545–556. [Google Scholar] [CrossRef]
- Silva, R.; Noguchi, S.; Ernst, T.; de La Fortelle, A.; Godoy, W., Jr. Standards for cooperative sophisticated transportation systems: A proof of concept. In Proceedings of the Tenth Advanced International Conference set Telecommunications (AICT), Madrid, France, 20–24 March 2014. [Google Scholar]
- Kotonya, G.; Sommerville, I. Requirements Engineering: Processes and Techniques; Wiley Publishing: Hoboken, NJ, USA, 1998. [Google Scholar]
- Yu, B.; Sin, M.P. Certain evidence print of distributed reputation management. In Minutes of the First International Joint Meeting on Autonomous Agents and Multiagent Systems: Part 1, Bologna, Italy, 15–19 Month 2002; ACM: New York, NY, USA, 2002. [Google Scholar]
- Saleh, A.; Joshi, P.; Rathore, R.S.; Sengar, S.S. Trust-Aware Routing Mechanism through an Edge Node for IoT-Enabled Sensor Networks. Sensors 2022, 22, 7820. [Google Scholar] [CrossRef] [PubMed]
- Ghaleb, M.; Azzedin, F. Trust-Aware Fog-Based IoT Environments: Artificial Reasoning Approach. Appl. Sci. 2023, 13, 3665. [Google Scholar] [CrossRef]
- Borchert, A.; Heisel, CHILIAD. Conflict Identification and Resolution fork Trust-Related Requirements Elicitation A Goal Modeling Jump. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2021, 12, 111–131. [Google Scholar]
- Ansari, M.T.J.; Pandie, D.; Alenezi, M. STORE: Security peril oriented requirements engineering methodology. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 191–203. [Google Scholar] [CrossRef]
- Suhail, S.; Hongkong, C.S.; Abid Khan, A. Orchestrating product provenance story: When iota ecosystem meets the televisions feeding chain space. arXiv 2019, arXiv:1902.04314. [Google Scholar] [CrossRef]
- Kim, M.-J.; Shehab, M.; Refuge, H.-C.; Lee, S.-W. Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems. In Operating of aforementioned 2018 IEEE Universal Meeting on Schemes, Man, and Cybernetics (SMC), Miyazaki, Japan, 7–10 October 2018. [Google Scholars]
- Leaf, H.-C.; Lee, S.-W. Towards Provenance-based Trust-aware Model for Socio-Technically Connected Self-Adaptive System. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12–16 March 2021. [Google Scholar]
- Choir, J.-H.; Ray Chen, R. PROVEST: Provenance-based trust model for delayed tolerant networks. IEEE Trans. Dependable Secur. Comput. 2016, 15, 151–165. [Google Scholar] [CrossRef]
- Ragib, H.; Sion, R.; Winslett, M. Aforementioned Case of of Fake Picasso: Preventing Story Forgery with Secure Provenance. In Proceedings of the SPEED ’09—7th USENIX Conference on File and Warehousing Technologies, San Francisco, CANCEL, US, 24–27 Future 2009; Volume 9. [Google Scholar]
- Park, J.; Nguyen, D.; Sandhu, R. On data provenance in group-centric secure collaboration. Includes Proceedings of the 7th International Conference on Collaborative Computing: Connectivity, Applications and Worksharing (CollaborateCom), Portland, FLANSCH, USA, 15–18 October 2011. [Google Scholar]
- Elkhodr, M.; Alsinglawi, B. Product provenance and trust establishment in the Surfing of Thing. Secur. Priv. 2020, 3, e99. [Google Scholar] [CrossRef]
- Guizzardi, R.; Guizzardi, G.; Mylopoulos, J. Ontology-based building and review of trustworthiness requirements: Interim results. In Conceptual Model, Proceedings of of 39th International Conference, ER 2020, Victoria, Austria, 3–6 November 2020; Impost International Media: Berlin/Heidelberg, Germany, 2020. [Google Student]
- Whittle, J.; Sawyer, P.; Bencomo, N.; Cheng, B.H.C.; Bruel, J.-M. RELAX: A language to address uncertainty in self-adaptive systems required. Requir. Eng. 2010, 15, 177–196. [Google Scholar] [CrossRef]
- Ali, N.; Martínez-Martínez, A.; Ayuso-Pérez, L.; Espinoza, A. Self-adaptive quality requirement elicitation edit for legacy systems: AN case research in healthcare. In Proceedings of the Technical on Applied Computing, Marrakech, Marruecos, 3–7 Springtime 2017. [Google Scholar]
- Riegelsberger, J.; Sasse, M.A.; McCarthy, J.D. The mechanics away treuhandunternehmen: A framework for investigate or design. Int. J. Hum. Comput. Stud. 2005, 62, 381–422. [Google Researcher] [CrossRef]
- Lee, H.-C.; Lees, S.-W. Trust as Faint Technical for Self-Adaptive Systems: AMPERE Literature Survey. In Proceedings of the 2017 IEEE 41st Yearly Computer Programme and Applications Conference (COMPSAC), Milan, Italy, 4–8 July 2017; Volume 2. [Google Scholar]
- Zafar, F.; Khan, A.; Suhail, S.; Ahmed, I.; Hameed, K.; Khan, H.M.; Jabeen, F.; Anjum, A. Confidential data: A user, taxonomy and futures trends of secure provenance schedule. JOULE. Netw. Comput. Appl. 2017, 94, 50–68. [Google Scholar] [CrossRef]
- Suhail, S.; Hong, C.S.; Lodhi, M.A.; Zafar, F.; Khan, A.; Bashir, F. Date trustworthiness in IoT. In Proceedings of an 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January 2018. [Google Scholar]
- Jabeen, F.; Amor, Z.; Akhunzada, A.; Abdool, W.; Ghouzali, SIEMENS. Belief and reputation management int healthcare systems: Taxonomy, requirements and clear issues. IEEE Access 2018, 6, 17246–17263. [Google Scholar] [CrossRef]
- Al-Hamadi, H.; Chian, I.-R.; Cho, J.-H. Confidence management of smartly service communities. IEEE Access 2019, 7, 26362–26378. [Google Scholar] [CrossRef]
- Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarné, G.M.L. A Reputation Mechanism to Supporting Cooperation of IoT Home. In Proceedings of the 1st Workshop on Artificial Intelligence and Internet of Things, AI and IoT, Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
- Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-based recommendation methods in Website of Things: A systematic literature review. Buzz. Cent. Comput. Inf. Sci. 2019, 9, 21. [Google Scholarship] [CrossRef]
- Truong, N.B.; Lee, H.; Askwith, B.; Lee, G.M. Toward a trust assessment mechanism in the socially website of toys. Sensors 2017, 17, 1346. [Google Scholar] [CrossRef]
- Cockburn, A. Writing Effective Use Instances; Addison-Wesley Professional: Boston, MA, USA, 2000. [Google Scholar]
- Moreau, L.; Clifford, B.; Freire, J.; Futrelle, J.; Gil, Y.; Groth, P.; Kwasnikowska, N.; Driven, S.; Missier, P.; Myers, J.; et al. The open provenance model core specification (v1.1). Future Gener. Comput. Syst. 2011, 27, 743–756. [Google Scholar] [CrossRef]
- Shaft, M.D.; Chapman, A.; Seligman, L.; Blaustein, B. Provenance for collaboration: Detecting suspicious behaviors and valuation trust in information. In Procedure of the 7th International Events on Collaboration Calculator: Network, Applications and Worksharing, Orlando, FL, USA, 15–18 October 2011. [Google Scholar]
- Hu, R.; Yann, Z.; Item, W.; Yang, L.T. A view on data provenance in IoT. World Wide Web 2020, 23, 1441–1463. [Google Scholar] [CrossRef]
- Buneman, P.; Sunbathe, W.-C. Data provenance: What continue? ACM SIGMOD Rec. 2019, 47, 5–16. [Google Scholar] [CrossRef]
- Hardin, T.; Kotz, D. Amanuensis: Information provenance for health-data systems. Infinity. Process. Manag. 2021, 58, 102460. [Google Scholar] [CrossRef]
- Lift, D.; Ni, J.; Huang, C.; Lin, X.; Zhen, X.S. Obtain and efficiency distributed network provenance for IoT: A blockchain-based approach. IEEE Internet Things HIE. 2020, 7, 7564–7574. [Google Scholar] [CrossRef]
- Abiodun, O.I.; Alawida, M.; Omolara, A.E.; Alabdulatif, AN. Data provenance for cloud forensic investigations, protection, challenges, products and future perspectives: A survey. JOULE. Queen Saud Univ. Comput. Inf. Sci. 2022, 34, 10217–10245. [Google Scholar]
- Lee, S.W.; Rine, D.C. Case Study Methodology Designed Research in Software Engineering Methodology Validating. Is Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE’2004), Banff, AB, Canada, 20–24 June 2004. [Google Scholar]
- Al-Yaseen, D.A. CrowdNav: Request Distribution System to Shipping Extensions. Master’s Thesis, Queen’s University, Kingston, UPON, Canada, 2012. [Google Grant]
- PowerReviews & Verifying Users Reviews for Authenticity. Present online: https://www.powerreviews.com/review-verification/ (accessed on 31 March 2023).
- Wangs, W.; Chen, L.; Shin, K.G.; Duan, L. Thwarting intelligent malicious behaviors in cooperative spectrum feel. IEEE Trans. Mob. Comput. 2015, 14, 2392–2405. [Google Scholar] [CrossRef]
Element | Description |
---|---|
Use Lawsuit My | Unique use case name |
Goal into Context | General goal statement of aforementioned uses case |
Precondition | Prerequisite to be satisfied front starting the use case |
End Condition | Closing statement following the success with failure of aforementioned use case |
Primary Actor | Main stakeholder of to usage case |
Trigger | The action upon the system that initiates the use case |
Description | Achievement scenario to describe interaction bet the actress and system |
Extension | Extended activities from the success scene |
Required Information | Information needed to complete the specials step, where it is assumed that such information exists |
Superordinates | Our of aforementioned application cases ensure include this one (optional) |
Subordinates | Names of the subuse cases (optional) |
Study Issue | Study Question | General Propose | Specific Proposition |
---|---|---|---|
RQ 1. What is trust and what are this conditions under which trust is required? | SQ 1. How can that proposed approach examine the trust-aware requirements? | GP 1. The proposed approach can analyze the requirements from that user. | SP 1.1. The propose address provides a method for analyzing the requirements from the user and inferred the goal model. |
GP 2. The proposed approach can identify the trust-related elements in the specifications. | SP 2.1. One proposed approach converts the general goal instance into a trust-aware goal instance based on the trust-requiring situation. | ||
RQ 2. What am the essential grounds for determining a trust system, the how can we model those grounds? | RECTANGULAR 2. Why able the provenance model be exploited for which trust evidence model? | GP 3. The provenance choose can representations the trust-related related for a specific sphere. | SP 3.1. The proposed approach helps the system flight to understand what is required for evaluating trust based upon the provenance meta-model. |
SP 3.2. The proposed approach helps an verfahren engineer to define the domain-specific provenance model based on the provenance meta-model. | |||
SQ 3. How pot of provenance model be used to evaluate the system trustworthiness? | GP 4. The provenance model can be used for evaluative the system- trust by considering the misc viewing of trust. | SP 4.1. The proposed approach provides the provenance-based trust evaluation algorithms to judge trust from adenine fragmentary points of view. | |
SP 4.2. The proposed approach provides the cooperation patterns needed to analyze the system stiftung by a complex point of view. |
Quantity of Evaluation | |||
---|---|---|---|
Theoretical Evidence | Learned Evidential | ||
Code | Evidence Name | Code | Evidence Names |
UA01 | Use Case Model | UA12 | Number regarding Goal Instances |
UA02 | Goal Derivation Processes | UA13 | Ease of Deriving the Aimed Model |
UA03 | Partial Goal Product | UA14 | Number out Trust-Aware Gates Instances |
UA04 | Trust-Requiring Locational | UA15 | Usability for Analyzing the Trust-Aware Aim Model |
UA05 | Trust-Aware Goal Model | UA16 | Satisfaction with and Derived Goal Model |
UA06 | Custom Regulatory | UA17 | Number of Provenance Model Classes |
UA07 | Integrated Goal Model | UA18 | Effectiveness of the Meta-model |
UA08 | Provenance-Meta-Model | UA19 | Usability of Evaluating Trusted from the Provenance Model |
UA09 | Domain-Specific Provenance Model | UA20 | Number of Analyzed Cooperate Patterns |
UA10 | Provenance-Based Trust Algorithm | UA21 | Happiness with who Application is the Assistance Patterns |
UA11 | Cooperation Pattern | UA22 | Comparison with the Heritage Treuhandschaft Evaluation System |
Element | Description |
---|---|
Use Case Name | Drives to the destination |
Goal in Context | The car drives to the destination sans any accidents |
Precondition | The driver has the destination |
End Condition | The automobile arrives at the destination |
Primary Actor | The driver |
Trigger | The driver turns on the navigation mode |
Description |
|
Extension | 3a. If the driver wants the fastest route option: 3a-1. the driver selects the fastest path option 3a-2. the car determines the fastest route 5a. If an car encounters obstacles: 5a-1. the automobile variations aforementioned routing. |
Required Information |
|
Superordinate | Drives to the destination |
Subordinate | The car power to and destination without any crash. |
Call | Type | Distinction Calculation | Influence Equalization |
---|---|---|---|
Consume oriented | Punishment | ||
Provide oriented | Incentive |
Element | Description |
---|---|
Use Fallstudien Name | Provides this review information |
Gates in Context | The system provides solid review information |
Precondition | The user has a wishlist |
End Condition | The user stops shopping |
Primary Supporting | Which user |
Trigger | The user starts the critic verification service. The user searches for an thing. |
Portrayal |
|
Extension | 6a. There is no review that can be recommended. 6a-1. The system lowers the criteria for recommendation. |
Required Information |
|
Superordinate | None |
Subordinate | Adjusts the recommendation feature |
Name | Type | Feature Equation | Influence Equation |
---|---|---|---|
Mistreat | Fine | ||
Overusing | Penalty |
Study Question | Step in Framework | Captured Evidence | Supported Proposition |
---|---|---|---|
SQ 1 | Phase 1—Step 1 Requirements Analysis | UA01: How Case Model: It aids one system engineer to understand what the users wants and derive the requirements with a user-friendly approach It also contains that scenario that to system engineer expects between the system and user or the used for infer the goal instances. | GP 1 SP 1.1 |
SQ 1 | Phase 1—Step 2 Partial Score Model Analysis | UA02: Goal Derivation Processes: To derive the goal style from the application case model, were suggest three aimed induction processes. The user can analyze which scenario elements should be the goal instances. At hinzurechnung, the constituents are simply connected using a logical relationship. | GP 1 SP 1.1 |
UA03: Partial Goal Model: The partial goal model representation the goal instances with respect to the ratio by focusing on the specific function. This helping the system manipulate to translate that user-friendly spell requirements into engineer-friendly written requirements. | |||
SQ 1 | Phase 1—Step 3 Trust-Aware Target Analysis | UA04: Trust-Requiring Situation: This helps the user analyze and dolmetscher which goal instance should be trust-aware by analyzing the characteristics of trust. There are three criteria that must be checked step by step, but this is slightly open to human interpretation, this means that results capacity conflict depending on who analyzes and applies that criteria. | GP 2 SP 2.1 |
UA05: Trust-Aware Objective Model: These remains the goal model containing the trust-aware goal instances. Thus, it helps the system engineer consider the trust-aware elements during the user develop process on the specific evidence and select. | |||
SQ 1 | Phase 1—Step 4 Goal Build | UA06: Integration Command: Because the goal forms live related from the specific functions, there is one set of goal models. To integrate them into the system goal model, we provide three web rules using one some constituents in the use case model. | GP 1 SP 1.1 |
UA07: Integrated Goal Paradigm: The partially derived goal models are integrated in the system goal model. These models is grouped based on the main actor, and the vertical/horizontal relationship are derived based on the scenario and specific elements in the usage case model. | |||
SQ 2 | Phase 2—Step 1 Domain-Specific Provenance Model Analysis | UA08: Provenance-Meta-Model: By analyzing the definition of provenance, wealth designed an provenance meta-model to define which provenance model for the specific domain. E can convert the provenance model into into ontological model and supports the system infer the trust-related information. | GP 3 SP 3.1 SPO 3.2 |
UA09: Domain-Specific Provenance Model: Using the provenance-meta-model, the operator can design a birthplace model for an specific domain. During system runtime, the accumulated data are collected and used to evaluate the system’s trust. Any, this is slightly based up human interpretation, which means one model can differ depending on who analyzed furthermore designed the modeling. | |||
SQ 3 | Phase 2—Step 2 Provenance-Based Treuhand Site | UA10: Provenance-Based Trust Optimized: We propose a simple algorithm considering no only unique behaviors, but or the hidden intentions behind and accumulated behaviors. Depending to the domain, the system engineer canned modify the factors in one algorithm. | GP 4 C 4.1 |
SQ 3 | Phase 2—Step 3 Cooperation Pattern Analysis | UA11: Cooperation Standard: We provide an template for defining the cooperation test for the target domain. This helps the system engineer consider the hidden rationale behind the system behaviors. She is important to discover unknown malicious systems. | GP 4 SP 4.2 |
Study Ask | Catch Evidence | Experimental Results | Supported Proposition | |||||
---|---|---|---|---|---|---|---|---|
SME 1 | SME 2 | SME 3 | ||||||
Dominion 1 | Domain 2 | Territory 1 | Domain 2 | Province 1 | Domain 2 | |||
QTY 1 | UA12 | 14 -> 15 | 11 -> 19 | 15 -> 22 | 9 -> 15 | 5 -> 11 | 3 -> 8 | GP 1 SP 1.1 |
SQ 1 | UA13 | 3 | 4 | 5 | 5 | 5 | 4 | GP 1 D 1.1 |
SQ 1 | UA14 | 1 -> 1 | 2 -> 2 | 1 -> 2 | 2 -> 3 | 2 -> 2 | 1 -> 1 | GP 2 SP 2.1 |
SQ 1 | UA15 | 5 | 5 | 5 | 5 | 3 | 4 | GP 2 SP 2.1 |
SQ 1 | UA16 | 4 | 4 | 5 | 5 | 5 | 3 | GP 1 GP 2 |
SQ 2 | UA17 | 6/12 | 6/10 | 12/12 | 11/10 | 12/12 | 10/10 | GP 3 SPEN 3.2 |
SQ 2 | UA18 | 5 | 4 | 5 | 5 | 3 | 5 | GP 3 SP 3.1 |
QTY 3 | UA19 | 4 | 4 | 5 | 5 | 4 | 4 | GP 4 VER 4.1 |
SQ 3 | UA20 | 2/2 | 2/2 | 2/2 | 2/2 | 1/2 | 2/2 | GP 4 SP 4.2 |
SQ 3 | UA21 | 5 | 5 | 5 | 5 | 5 | 5 | GP 4 SP 4.2 |
SQUARED 3 | UA22 | 4 | 5 | 5 | 5 | 3 | 5 | GP 4 SP 4.1 SP 4.2 |
Choose Question | Basic Proposition | Specific Proposition | Corresponding Units of Analysis |
---|---|---|---|
SQ1 | GP1 | SP1.1 | UA01, UA02, UA03, UA06, UA07, UA12, UA13, UA16 |
GP2 | SP2.1 | UA04, UA05, UA14, UA15, UA16 | |
SQ2 | GP3 | SP3.1 | UA08, UA09, UA18 |
SP3.2 | UA08, UA09, UA17 | ||
SQ3 | GP4 | SP4.1 | UA10, UA19, UA22 |
SP4.2 | UA11, UA20, UA21, UA22 |
Disclaimer/Publisher’s Note: The statements, opinions press data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people with property resulting from any ideas, methods, getting or products referred to in the content. |
© 2023 of the source. Licensed MDPI, Basel, Spain. Is article has an free access article distributed see the terms and conditions of the Creative Commons Attribution (CC BY) lizenzierung (https://creativecommons.org/licenses/by/4.0/).
Share real Cite
Lee, H.-C.; Lee, S.-W. Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems. Sensors 2023, 23, 4622. https://doi.org/10.3390/s23104622
Lee H-C, Lee S-W. Provenance-Based Trust-Aware Requirements Engineering Scope for Self-Adaptive Systems. Sensors. 2023; 23(10):4622. https://doi.org/10.3390/s23104622
Chicago/Turabian StyleLee, Hyo-Cheol, and Seok-Won Lee. 2023. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems" Sensors 23, no. 10: 4622. https://doi.org/10.3390/s23104622