%0 Conference Proceedings %T Trustworthy Software Development %+ Brandenburg University of Applied Sciences %+ Universität Duisburg-Essen = University of Duisburg-Essen [Essen] %A Paulus, Sachar %A Mohammadi, Nazila, Gol %A Weyer, Thorsten %Z Part 4: Keynotes %< avec comité de lecture %( Lecture Notes in Computer Science %B 14th International Conference on Communications and Multimedia Security (CMS) %C Magdeburg,, Germany %Y Bart Decker %Y Jana Dittmann %Y Christian Kraetzer %Y Claus Vielhauer %I Springer %3 Communications and Multimedia Security %V LNCS-8099 %P 233-247 %8 2013-09-25 %D 2013 %R 10.1007/978-3-642-40779-6_23 %K Software development %K Trustworthiness %K Trust %K Trustworthy software %K Trustworthy development practices %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X This paper presents an overview on how existing development methodologies and practices support the creation of trustworthy software. Trustworthy software is key for a successful and trusted usage of software, specifically in the Cloud. To better understand what trustworthy software applications actually mean, the concepts of trustworthiness and trust are defined and put in contrast to each other. Furthermore, we identify attributes of software applications that support trustworthiness. Based on this groundwork, some well-known software development methodologies and best practices are analyzed with respect on how they support the systematic engineering of trustworthy software. Finally, the state of the art is discussed in a qualitative way, and an outlook on necessary research efforts and technological innovations is given. %G English %Z TC 6 %Z TC 11 %2 https://inria.hal.science/hal-01492828/document %2 https://inria.hal.science/hal-01492828/file/978-3-642-40779-6_23_Chapter.pdf %L hal-01492828 %U https://inria.hal.science/hal-01492828 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TC6 %~ IFIP-CMS %~ IFIP-LNCS-8099