[1] |
SCHULTZ J E , BROWN D S , LONGSTAFF T A . Responding to computer security incidents[EB/OL].( 1990-07-23)[ 2015-09-20]. .
|
[2] |
PFLEEGER C P . Security in computing[M]. Upper Saddle River: Prentice-Hall, 1997: 46-48.
|
[3] |
SHIN Y , WILLIAMS L . Is complexity really the enemy of software security[C]// The 4th ACM Workshop on Quality of Protection October27-31, Alexandria,VA,USA.. New York: ACM Press, 2008:47-50.
|
[4] |
ANDERSON R . Security in open VeTSUS closed systems-the dance of boltzmann,coase and moore[C]// The Conference on Open Source Software Economics Jul9, 2002, London,UK. Cambridge: MIT Press, 2002:1-15.
|
[5] |
MUSA J D , IANNINO A , OKUMOTO K . Software reliability engineering[M]. New York: McGraw-Hill, 1999: 193-223.
|
[6] |
MUSA J D , OKUMOTO K . A logarithmic Poisson execution time model for software reliability measurement[C]// The 7th Int'l Conference on Software Engineering Orlando: IEEE Press, 1984:230-238.
|
[7] |
RESCORLA E . Is fining security holes a good idea[J]. IEEE Security&Privacy, 2005,3(1):14-19.
|
[8] |
BECKER S , HASSELBRING W , PAUL A , et al. Trustworthy software systems:a discussion of basic concept and terminology[J]. ACM Sigsoft Software Engineering Notes, 2006,31(6):1-18.
|
[9] |
杨光宇, 曾东方, 罗平 . 考虑短板效应的一种度量模型及其在软件可信性中的应用[J]. 计算机应用研究, 2012(1):165-167. YANG G Y , ZENG D F , LUO P . Metric model considering effect of short board and its application in software trustworthiness[J]. Application Research of Computers, 2012(1):165-167.
|
[10] |
王怀民, 刘旭东, 郎波 , 等. 软件可信分级规范 v2.0[R/OL].[ 2009-05-30]. . WANG H M , LIU X D , LANG B , et al. Research on method of emergency aid decision-making based on CBR[J]. Software trustworthiness classification specification v2.0[R/OL].[ 2009-05-30]. .
|
[11] |
王怀民, 唐扬斌, 尹刚 , 等. 互联网软件的可信机理[J]. 中国科学E辑, 2006,36(10):1156-1169. WANG H M , TANG Y B , YIN G , et al. he trusted mechanism of Internet software[J]. Science in China(E), 2006,36(10):1156-1169.
|
[12] |
LIU Y Z , ZHANG L , LUO P , et al. Research of trustworthy software system in the network[C]// The 5th International Symposium on Parallel Architectures,Algorithms and Programming, Dec17-20, 2012, Taipei,China. New Jersey: IEEE Press, 2012:287-294.
|
[13] |
VOAS J . Why is it so hard to predict software system trustworthiness from software component trustworthiness[C]// The 20th IEEE Symposium on Reliable Distributed Systems, October28-31, 2001, New Orleans,Louisiana,USA. New Jersey: IEEE Press, 2001:179-179.
|
[14] |
MUSA J D . A theory of software reliability and its application[J]. IEEE Transactions on Software Engineering,Los Alamitos, 1975,1(3):312-372.
|
[15] |
MUSA J D , OKUMOTO K . A logarithmic Possion excution time model for software reliability measurement[C]// The 7th International Conference on Software Engineering. [S.l.]:Whippany Bell Laboratories, 1984:230-238.
|