O'Reilly logo

Emerging Trends in ICT Security by Hamid R Arabnia, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Designing Trustworthy Software Systems Using the NFR Approach

Nary Subramanian1, Steven Drager2 and William McKeever2,    1University of Texas at Tyler, Tyler, TX, USA,    2US Air Force Research Lab, Rome, NY, USA

Trustworthy systems are essential for critical operations—they ensure that reliability, usability, interoperability, and security are built into the systems, and that the systems deliver when they are most needed. There are environments where trustworthiness is an essential property in military, government, and civil domains. Examples include missile deployment control systems, the tax submission system of the federal government, and nuclear safety control systems. However, not many methods exist for the systematic engineering ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required