{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:37Z","timestamp":1726037737446},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_40","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"433-442","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net"],"prefix":"10.1007","author":[{"given":"Yong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Ming","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Detao","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhongwen","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Shudong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"40_CR1","first-page":"145","volume":"22","author":"K Liu","year":"2008","unstructured":"Liu, K., Shan, Z., Wang, J., He, J., Zhang, Z., Qin, Y.: Overview on major research plan of trustworthy software. Bull. Natl. Nat. Sci. Found. China 22(3), 145\u2013151 (2008)","journal-title":"Bull. Natl. Nat. Sci. Found. China"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Yu, Y., Li, T., Liu, Q., Dai, F., Zhao, N.: OR-transition colored petri net and its application in modeling software system. In: Proceedings of 2009 International Workshop on Knowledge Discovery and Data Mining, January 2009, Moscow, Russia, pp. 15\u201318 (2009)","DOI":"10.1109\/WKDD.2009.23"},{"key":"40_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/0471750336","volume-title":"Trustworthy Systems Through Quantitative Software Engineering. Quantitative Software Engineering","author":"L Bernstein","year":"2005","unstructured":"Bernstein, L., Yuhas, C.: Trustworthy Systems Through Quantitative Software Engineering. Quantitative Software Engineering. Wiley-IEEE Computer Society Press, New York (2005). Silver Spring MD"},{"key":"40_CR4","unstructured":"Ding, B., Wang, H.M., Shi, D.X., Li, X.: Component model supporting trustworthiness-oriented software evolution. J. Soft. 22(1), 17\u201327 (2011). http:\/\/xueshu.baidu.com\/s?wd=author%3A%28LI%20Xiao%29%20School%20of%20Computer%20National%20University%20of%20Defense%20Technology&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8&sc_f_para=sc_hilight%3Dperson"},{"issue":"1","key":"40_CR5","first-page":"41","volume":"7","author":"HJ Yang","year":"2013","unstructured":"Yang, H.J., Zheng, S.: Software evolution for moving into and moving within internetware paradigm. Int. J. Softw. Inf. 7(1), 41\u201361 (2013)","journal-title":"Int. J. Softw. Inf."},{"key":"40_CR6","unstructured":"Jia, Y.H., Zheng, S.: Software evolution based on service-oriented requirement in internetware. In: 4th International Conference on Computer Research and Development, pp. 20\u201325. IACSIT Press, Singapore (2012)"},{"key":"40_CR7","unstructured":"Secure Software, Inc. The CLASP Application Security Process (2005). http:\/\/www.ida.liu.se\/~TDDC90\/papers\/clasp_external.pdf"},{"issue":"1","key":"40_CR8","first-page":"161","volume":"43","author":"H Zhao","year":"2013","unstructured":"Zhao, H., Sun, J.: An algebraic model of internetware software architecture. Sci. Sinica 43(1), 161 (2013)","journal-title":"Sci. Sinica"},{"issue":"2","key":"40_CR9","first-page":"273","volume":"56","author":"X Xie","year":"2018","unstructured":"Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273\u2013283 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"3","key":"40_CR10","first-page":"977","volume":"29","author":"X Chen","year":"2012","unstructured":"Chen, X.: New system based on event-driven and service-oriented business activity monitoring design and implementation. Appl. Res. Comput. 29(3), 977\u2013980 (2012)","journal-title":"Appl. Res. Comput."},{"issue":"1","key":"40_CR11","first-page":"33","volume":"72","author":"P Panwar","year":"2013","unstructured":"Panwar, P., Garg, A.: Analysis of reliability and cost tradeoffs in architecture based software applications using a genetic algorithm. Int. J. Comput. Appl. 72(1), 33\u201337 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"40_CR12","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-642-31656-2_78","volume":"180","author":"L Qiuying","year":"2013","unstructured":"Qiuying, L., Haifeng, L., Guodong, W.: Sensitivity analysis on the influence factors of software reliability based on diagnosis reasoning. Adv. Intell. Syst. Comput. 180, 557\u2013566 (2013)","journal-title":"Adv. Intell. Syst. Comput."},{"issue":"16","key":"40_CR13","first-page":"19","volume":"49","author":"P Shanmugapriya","year":"2012","unstructured":"Shanmugapriya, P., Suresh, R.M.: Software architecture evaluation methods\u2212a survey. Int. J. Comput. Appl. 49(16), 19\u201326 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Franco, J.M., Barbosa, R., Zenha-Rela, M.: Reliability analysis of software architecture evolution. In: Sixth Latin-American Symposium on Dependable Computing (LADC), Rio de Janeiro, Brazil, pp. 11\u201320 (2013)","DOI":"10.1109\/LADC.2013.16"},{"issue":"11","key":"40_CR15","first-page":"17","volume":"1","author":"H Rathod","year":"2012","unstructured":"Rathod, H., Parmar, M.: Study of genetic approach in estimating reliability of component based software. PARIPEX - Indian J. Res. 1(11), 17\u201319 (2012)","journal-title":"PARIPEX - Indian J. Res."},{"issue":"8","key":"40_CR16","first-page":"1744","volume":"7","author":"J Wang","year":"2012","unstructured":"Wang, J., Chen, W.R.: A reliability-oriented evolution method of software architecture based on contribution degree of component. J. Softw. 7(8), 1744\u20131750 (2012)","journal-title":"J. Softw."},{"key":"40_CR17","doi-asserted-by":"publisher","unstructured":"Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https:\/\/doi.org\/10.1007\/s11042-018-6938-9","DOI":"10.1007\/s11042-018-6938-9"},{"issue":"1","key":"40_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MS.2015.4","volume":"32","author":"YP Liu","year":"2013","unstructured":"Liu, Y.P., Xu, C., Cheung, S.C.: diagnosing energy efficiency and performance for mobile internetware applications. IEEE Softw. 32(1), 67\u201375 (2013)","journal-title":"IEEE Softw."},{"key":"40_CR19","unstructured":"Chargo, J.T.: Automated software architecture extraction using graph-based clustering. Graduate Theses and Dissertations, Iowa State University (2013)"},{"issue":"10","key":"40_CR20","doi-asserted-by":"publisher","first-page":"e0202657","DOI":"10.1371\/journal.pone.0202657","volume":"13","author":"S Li","year":"2018","unstructured":"Li, S., Wu, X., Zhao, D., Li, A., Tian, Z., Yang, X.: An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments. PLoS ONE 13(10), e0202657 (2018)","journal-title":"PLoS ONE"},{"issue":"1","key":"40_CR21","first-page":"017","volume":"55","author":"J Cui","year":"2018","unstructured":"Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Continua 55(1), 017\u2013035 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T06:25:06Z","timestamp":1695018306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}