developed can be estimated. This can represent a
powerful tool for design trade-off decisions.
However, as has been highlighted in (Houmb et
al., 2005), the result of the analysis performed using
BBN is strongly dependent on the observation and
evidence entered, as well as the variables used and
relations between them. This means that both
different structure of the BBN topology and different
estimation sets used as input to the topology will
give different results.
Although the method presented is based on a real
application, this approach has not been applied to a
real assessment or development process. One task
could be to test this framework, mathematically
assess the robustness of a system and compare the
results with other methods. Another task will be to
apply the proposed approach for decision support
early in the development of a system, in order to
indicate where to concentrate the effort and thus
realise the specific objectives of the final product.
REFERENCES
Beaver, J. M., Schiavone, G. A. and Berrios, J. S., 2005.
Predicting Software Suitability Using a Bayesian
Belief Network. In IMCLA’05, 4th International
Conference on Machine Learning and Applications.
IEEE Computer Society Press.
Conallen, J., 2003. Building Web Applications with UML,
Addison-Wesley. Boston, 2
nd
edition.
Gran, B. A., 2002. Assessment of programmable systems
using Bayesian belief nets. Safety Science, 40, 797-
812.
Houmb, S. H., Georg, G., France, R., Bieman, J. M. and
Jürjens, J., 2005. Cost-Benefit Trade-Off Analysis
using BBN for Aspect-Oriented Risk-Driven
Development. In ICECCS’05, 10
th
International
Conference on Engineering of Complex Computer
Systems. IEEE Computer Society Press.
Kadie, C. M., Hovel, D. and Horvitz, E., 2001. MSBNx: A
Component-Centric Toolkit for Modeling and
Inference with Bayesian Networks. Microsoft
Research Technical Report MSR-TR-2001-67.
Lee, B. H., 2001. Using Bayes Belief Networks In
Industrial FMEA Modeling And Analysis.
Proceedings of Annual Reliability and Maintainability
Symposium 2001. IEEE.
Singh, H., Cortellessa, V., Cukic, B., Gunel, E. and
Bharadwaj, V., 2001. A Bayesian Approach to
Reliability Prediction and Assessment of Component
Based Systems. In ISSRE’01, 12th International
Symposium on Software Reliability Engineering. IEEE
Computer Society Press.
Yacoub, S. M., Cukic, B. and Ammar, H. H., 1999.
Scenario-Based Reliability Analysis of Component-
Based Software. In ISSRE’99, 10th International
Symposium on Software Reliability Engineering. IEEE
Computer Society Press.
Zhou, J. and Stålhane, T., 2004. A Framework for Early
Robustness Assessment. In IASTED’04, 8
th
International Conference on Software Engineering
and Applications. MIT Cambridge.
Ziemer, S. and Stålhane, T., 2006. Web Application
Development and Quality - Observations from
Interviews with Companies in Norway. In
Proceedings of Webist 2006. INSTICC Press.
APPENDIX
The prior probabilities that have been used for the
Log-in scenario are specified below. Noticed that
they have been set without any expert assessment
and they may thus not be accurate and/or correct.
The prior probabilities for user input UI and
database data DD of being Correct or Error are
P(UI) = (0.9,0.1) and P(DD) = (0.8,0.2) respectively.
The remaining probabilities are listed in Table 2,
Table 3, and Table 4.
For the modified Log-in scenario where
preventive actions are implemented, the following
prior probabilities have also been set. See Table 5.
The probabilities for the second Login/Control
LC2 are equal to those of previous Login/Control
LC, P(LC2|RI,DD)=P(LC|UI,DD), in Table 2.
Similarly the second response R2 given the second
Login/Control LC2 is equal to P(R2|LC2)=P(R|LC),
see Table 3. Severity probability P(S|FR) given the
Final Response FR is equal to P(S|R) in Table 4. The
remaining probabilities are listed in Table 6.
Table 2: The probabilities P(LC|UI,DD) of Login/Control
LC given user input UI and database data DD as parent
nodes.
Parent nodes LC=Correct LC=Error
DD=Correct 0.9 0.1
UI=Correct
DD=Error 0 1
DD=Correct 0 1
UI=Error
DD=Error 0 1
Table 3: The probabilities P(R|LC) of Response R given
Login/Control LC as parent node.
Parent node R=Correct R=None
LC=Correct 0.9 0.1
LC=Error 0 1
ROBUSTNESS ANALYSIS USING FMEA AND BBN - Case Study for a Web-based Application
169