
 
developed can be estimated. This can represent a 
powerful tool for design trade-off decisions.  
However, as has been highlighted in (Houmb et 
al., 2005), the result of the analysis performed using 
BBN is strongly dependent on the observation and 
evidence entered, as well as the variables used and 
relations between them. This means that both 
different structure of the BBN topology and different 
estimation sets used as input to the topology will 
give different results. 
Although the method presented is based on a real 
application, this approach has not been applied to a 
real assessment or development process. One task 
could be to test this framework, mathematically 
assess the robustness of a system and compare the 
results with other methods. Another task will be to 
apply the proposed approach for decision support 
early in the development of a system, in order to 
indicate where to concentrate the effort and thus 
realise the specific objectives of the final product.  
REFERENCES 
Beaver, J. M., Schiavone, G. A. and Berrios, J. S., 2005. 
Predicting Software Suitability Using a Bayesian 
Belief Network. In IMCLA’05, 4th International 
Conference on Machine Learning and Applications. 
IEEE Computer Society Press. 
Conallen, J., 2003. Building Web Applications with UML, 
Addison-Wesley. Boston, 2
nd
 edition. 
Gran, B. A., 2002. Assessment of programmable systems 
using Bayesian belief nets. Safety Science, 40, 797-
812. 
Houmb, S. H., Georg, G., France, R., Bieman, J. M. and 
Jürjens, J., 2005. Cost-Benefit Trade-Off Analysis 
using BBN for Aspect-Oriented Risk-Driven 
Development. In ICECCS’05, 10
th
 International 
Conference on Engineering of Complex Computer 
Systems. IEEE Computer Society Press. 
Kadie, C. M., Hovel, D. and Horvitz, E., 2001. MSBNx: A 
Component-Centric Toolkit for Modeling and 
Inference with Bayesian Networks. Microsoft 
Research Technical Report MSR-TR-2001-67. 
Lee, B. H., 2001. Using Bayes Belief Networks In 
Industrial FMEA Modeling And Analysis. 
Proceedings of Annual Reliability and Maintainability 
Symposium 2001. IEEE. 
Singh, H., Cortellessa, V., Cukic, B., Gunel, E. and 
Bharadwaj, V., 2001. A Bayesian Approach to 
Reliability Prediction and Assessment of Component 
Based Systems. In ISSRE’01, 12th International 
Symposium on Software Reliability Engineering. IEEE 
Computer Society Press. 
Yacoub, S. M., Cukic, B. and Ammar, H. H., 1999. 
Scenario-Based Reliability Analysis of Component-
Based Software. In ISSRE’99, 10th International 
Symposium on Software Reliability Engineering. IEEE 
Computer Society Press. 
Zhou, J. and Stålhane, T., 2004. A Framework for Early 
Robustness Assessment. In IASTED’04, 8
th
 
International Conference on Software Engineering 
and Applications. MIT Cambridge. 
Ziemer, S. and Stålhane, T., 2006. Web Application 
Development and Quality - Observations from 
Interviews with Companies in Norway. In 
Proceedings of Webist 2006. INSTICC Press. 
APPENDIX 
The prior probabilities that have been used for the 
Log-in scenario are specified below. Noticed that 
they have been set without any expert assessment 
and they may thus not be accurate and/or correct. 
The prior probabilities for user input UI and 
database data DD of being Correct or Error are 
P(UI) = (0.9,0.1) and P(DD) = (0.8,0.2) respectively. 
The remaining probabilities are listed in Table 2, 
Table 3, and Table 4. 
For the modified Log-in scenario where 
preventive actions are implemented, the following 
prior probabilities have also been set. See Table 5. 
The probabilities for the second Login/Control 
LC2 are equal to those of previous Login/Control 
LC, P(LC2|RI,DD)=P(LC|UI,DD), in Table 2. 
Similarly the second response R2 given the second 
Login/Control LC2 is equal to P(R2|LC2)=P(R|LC), 
see Table 3. Severity probability P(S|FR) given the 
Final Response FR is equal to P(S|R) in Table 4. The 
remaining probabilities are listed in Table 6. 
Table 2: The probabilities P(LC|UI,DD) of Login/Control 
LC given user input UI and database data DD as parent 
nodes. 
Parent nodes  LC=Correct  LC=Error 
DD=Correct 0.9  0.1 
UI=Correct 
DD=Error 0  1 
DD=Correct 0  1 
UI=Error 
DD=Error 0  1 
Table 3: The probabilities P(R|LC) of Response R given 
Login/Control LC as parent node. 
Parent node  R=Correct  R=None 
LC=Correct 0.9 0.1 
LC=Error 0 1 
 
ROBUSTNESS ANALYSIS USING FMEA AND BBN - Case Study for a Web-based Application
169