Citation: | ZHOU Wei, MA Yanfang, PAN Haiyu, “A Novel Trustworthiness Measurement Model Based on Weight and User Feedback,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 612-625, 2022, doi: 10.1049/cje.2020.00.391 |
[1] |
G. Shen, Z. Huang, B. Xie, et al., “Survey on software trustworthiness evaluation: Standards, models and tools,” Journal of Software, vol.27, no.4, pp.955–968, 2016. (in Chinese)
|
[2] |
C. Lin, J. Hu, G. Li, et al., “A review on the architecture of software defined network,” Chinese Journal of Electronics, vol.27, no.6, pp.1111–1117, 2018. doi: 10.1049/cje.2018.05.013
|
[3] |
D. Wang and Q. Wang, “Trustworthiness evidence supporting evaluation of software process trustworthiness,” Journal of Software, vol.29, no.11, pp.3412–3434, 2018. (in Chinese)
|
[4] |
P.G. Neumann, “Inside risks trustworthiness and truthfulness are essential,” Communications of the ACM, vol.60, no.6, pp.26–28, 2017. doi: 10.1145/3084344
|
[5] |
Q. Zhang, M. Zuo, Q. Cao, et al., “Research on SoftMan component dynamic evolution system and its distributed multi-tasks collaboration mechanism based on game theory,” Chinese Journal of Electronics, vol.27, no.4, pp.783–791, 2018. doi: 10.1049/cje.2018.01.004
|
[6] |
J. He, Z. Shan, J. Wang, et al., “Review of the achievements of major research plan of trustworthy software,” Bulletin of the National Natural Sciences Foundation, vol.32, no.3, pp.291–296, 2018.
|
[7] |
H. Wei, C. Shan, C. Hu, et al., “Software defect prediction via deep belief network,” Chinese Journal of Electronics, vol.28, no.5, pp.925–932, 2019. doi: 10.1049/cje.2019.06.012
|
[8] |
H. Tao and Y. Chen, “A metric model for trustworthiness of softwares,” IEEE/WIC/ACM International Joint Conferences on Web Intelligence & Intelligent Agent Technologies, Milan, Italy, pp.69–72, 2009.
|
[9] |
H. Tao, Y. Chen, H. Wu, et al., “A survey of software trustworthiness measurements,” International Journal of Performability Engineering, vol.15, no.9, pp.2364–2371, 2019. doi: 10.23940/ijpe.19.09.p9.23642372
|
[10] |
H. Tao, H. Wu, and Y. Chen, “An approach of trustworthy measurement allocation based on sub-attributes of software,” Mathematics, vol.7, no.3, pp.237–252, 2019. doi: 10.3390/math7030237
|
[11] |
H. Tao and Y. Chen, “A new metric model for trustworthiness of softwares,” Telecommunication Systems, vol.51, pp.95–105, 2012. doi: 10.1007/s11235-011-9420-9
|
[12] |
Y. Ma, Y. Chen, and B. Gu, “An attributes-based allocation approach of software trustworthy degrees”, IEEE International Conference on Software Quality, Reliability and Security - Companion, Vancouver, BC, Canada, pp.89–94, 2015.
|
[13] |
B. Wang, Y. Chen, S. Zhang, et al., “Updating model of software component trustworthiness based on users feedback,” IEEE Access, vol.7, pp.60199–60205, 2019. doi: 10.1109/ACCESS.2019.2892518
|
[14] |
M. D. McIlroy, “Mass-produced software components”, Software Engineering: Report on a Conference Sponsored by the NATO Science Committee, Garmisch, Germany, pp.138–155, 1968.
|
[15] |
C. Szyperski, D. Gruntz, and S. Murer, “Component software: Beyond object-oriented programming,” Communications of the ACM, vol.40, no.4, pp.38–39, 2003.
|
[16] |
T. Vale, I. Crnkovic, E.S.D. Almeida, et al., “Twenty-eight years of component-based software engineering,” Journal of Systems and Software, vol.111, pp.128–148, 2016. doi: 10.1016/j.jss.2015.09.019
|
[17] |
J. Zhang, “Reliability calculation of component-based software,” Journal of Computer Applications, vol.35, no.S2, pp.164–169, 2015. (in Chinese)
|
[18] |
D. Huang, “Component-based software trustworthiness measurement and allocation model”, M.S.Thesis, Huaibei Normal University, Huaibei, China, 2019. (in Chinese)
|
[19] |
B. Wang, “Research on trustworthiness measurement models based on software component”, Ph.D.Thesis, East China Normal University, Shanghai, China, 2019. (in Chinese)
|
[20] |
M. Wang, Y. Ma, G. Li, et al., “Multi-value models for allocation of software component development costs based on trustworthiness,” IEEE Access, vol.8, pp.122673–122684, 2020. doi: 10.1109/ACCESS.2020.3007158
|
[21] |
G.D. Bona and A. Forcina, “Analytic critical flow method (ACFM): A reliability allocation method based on analytic hierarchy process,” Journal of Failure Analysis and Prevention, vol.17, no.6, pp.1149–1163, 2017. doi: 10.1007/s11668-017-0353-9
|
[22] |
A.P. Dumpster, “Upper and lower probabilities induced by a multivalued mapping,” Annals of Mathematical Statistics, vol.38, no.2, pp.325–339, 1967. doi: 10.1214/aoms/1177698950
|
[23] |
G. A. Shafer, A Mathematical Theory of Evidence, New Jersey, USA: Princeton University Press, pp.78–103, 1976.
|
[24] |
X. Fei and J. Zhou, “A D-S evidence weight computing method for conflict evidence,” Computer Engineering, vol.42, no.2, pp.142–145, 2016. (in Chinese)
|
[25] |
C. Lin, C. Xue, J. Hu, et al., “Hierarchical architecture design of computer system,” Chinese Journal of Computers, vol.40, no.9, pp.1996–2017, 2017. (in Chinese)
|
[26] |
W. Lu, F. Xu, J. LV, et al., “An approach of software reliability evaluation in the open environment,” Chinese Journal of Computers, vol.33, no.3, pp.452–462, 2010. (in Chinese) doi: 10.3724/SP.J.1016.2010.00452
|
[27] |
Y. Ma, M. Wang, W. Zhou, et al., “A trustworthiness-based development cost allocation algorithm of modular software,” Computer Engineering & Science, vol.42, no.6, pp.1021–1029, 2020. (in Chinese)
|
[28] |
X. Mao and Y. Deng, “A general model for component-based software reliability,” Journal of Software, vol.15, no.1, pp.27–32, 2004. (in Chinese)
|