Citation: | “An Evidence-Driven Framework for Trustworthiness Evaluation of Software Based on Rules,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 589-593, 2012, |
Wang Huaimin, Tang Yangbin, Yin Gang, Li Lei, “Trustworthinessof Internet-based software”, Science in China Series F:Information Sciences, Vol.49, No.6, pp.759-773, 2006.
|
Wang Yue, Liu Chun, Zhang Wei, Jin Zhi, “Knowledgeguided software trustworthiness requirements elicitation”, ChineseJournal of Computers, Vol.34, No.11, pp.2165-2175, 2011.
|
Lu Wen, Xu Feng, Lv Jian, “An approach of software reliabilityevaluation in the open environment”, Chinese Journal ofComputers, Vol.33, No.3, pp.452-462, 2010.
|
M. Palviainen, A. Evesti, E. Ovaska, “The reliability estimation,prediction and measuring of component-based software”,Journal of Systems and Software, Vol.84, No.6, pp.1054-1070,2011.
|
Bao Tie, Liu Shufen, Wang Xiaoyan, “Research on trustworthinessevaluation method for domain software based on actualevidence”, Chinese Journal of Electronics, Vol.20, No.2,pp.195-199, 2011.
|
D.P. Holzworth, N.I. Huth, P.G. DeVoil, “Simple software processesand tests improve the reliability and usefulness of amodel”, Environmental Modelling & Software, Vol.26, No.4,pp.510-516, 2011.
|
Wang Yang, Wang Ruchuan, Han Zhijie, “Dynamical trust constructionschema with fuzzy decision in P2P systems”, ChineseJournal of Electronics, Vol.18, No.3, pp.417-421, 2009.
|
L. Gu, Y. Guo, H. Wang, Y.Z. Zou, B. Xie, W.Z. Shao, “Runtimesoftware trustworthiness evidence collection mechanismbased on TPM”, Journal of Software, Vol.21, No.2, pp.373-387,2010.
|
S.H. Ryu, F. Casati, H. Skogsrud, B. Benatallah, R. Saint-Paul,“Supporting the dynamic evolution of Web service protocols inservice-oriented architectures”, ACM Transactions on the Web,Vol.2, No.2, artn.13, 2008.
|