{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:43Z","timestamp":1726037743584},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_41","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"443-451","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trusted Component Decomposition Based on OR-Transition Colored Petri Net"],"prefix":"10.1007","author":[{"given":"Na","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Min","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Chenming","family":"Song","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shudong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"41_CR1","first-page":"145","volume":"22","author":"K Liu","year":"2008","unstructured":"Liu, K., Shan, Z., Wang, J., He, J., Zhang, Z., Qin, Y.: Overview on major research plan of trustworthy software. China Science Fund. 22(3), 145\u2013151 (2008)","journal-title":"China Science Fund."},{"key":"41_CR2","unstructured":"Tokuda, L., Batory, D.: Automating three modes of evolution for object-oriented software architectures. In: Proceedings of COOTS 1999, San Diego, pp. 189\u2013202 (1999)"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Yu, Y., Li, T., Liu, Q., Dai, F., Zhao, N.: OR-transition colored Petri Net and its application in modeling software system. In: Proceedings of 2009 International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia, January 2009, pp. 15\u201318 (2009)","DOI":"10.1109\/WKDD.2009.23"},{"issue":"12","key":"41_CR4","first-page":"2586","volume":"37","author":"C Zhang","year":"2014","unstructured":"Zhang, C., Cui, G., Liu, H.W., Meng, F.C.: Component-based software reliability process technologies. Chin. J. Comput. 37(12), 2586\u20132612 (2014)","journal-title":"Chin. J. Comput."},{"issue":"7","key":"41_CR5","first-page":"1514","volume":"49","author":"J Tian","year":"2012","unstructured":"Tian, J., Han, J., Du, R., Wang, Y.: Creditability evaluation model based on software behavior trace. J. Comput. Res. Dev. 49(7), 1514\u20131524 (2012)","journal-title":"J. Comput. Res. Dev."},{"issue":"11","key":"41_CR6","first-page":"2397","volume":"50","author":"Z Li","year":"2013","unstructured":"Li, Z., Tian, J., Yang, X.: Dynamic trustworthiness evaluation model of software based on checkpoint\u2019s classification attributes. J. Comput. Res. Dev. 50(11), 2397\u20132405 (2013)","journal-title":"J. Comput. Res. Dev."},{"issue":"1","key":"41_CR7","first-page":"017","volume":"55","author":"J Cui","year":"2018","unstructured":"Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Continua 55(1), 017\u2013035 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Franco, J.M., Barbosa, R., Zenha-Rela, M.: Reliability analysis of software architecture evolution. In: Sixth Latin-American Symposium on Dependable Computing (LADC), Rio de Janeiro, Brazil, pp. 11\u201320 (2013)","DOI":"10.1109\/LADC.2013.16"},{"issue":"11","key":"41_CR9","first-page":"17","volume":"1","author":"H Rathod","year":"2012","unstructured":"Rathod, H., Parmar, M.: Study of genetic approach in estimating reliability of component based software. PARIPEX - Indian J. Res. 1(11), 17\u201319 (2012)","journal-title":"PARIPEX - Indian J. Res."},{"issue":"16","key":"41_CR10","first-page":"19","volume":"49","author":"P Shanmugapriya","year":"2012","unstructured":"Shanmugapriya, P., Suresh, R.M.: Software architecture evaluation methods \u2013 a survey. Int. J. Comput. Appl. 49(16), 19\u201326 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"8","key":"41_CR11","first-page":"1744","volume":"7","author":"J Wang","year":"2012","unstructured":"Wang, J., Chen, W.R.: A reliability-oriented evolution method of software architecture based on contribution degree of component. J. Softw. 7(8), 1744\u20131750 (2012)","journal-title":"J. Softw."},{"issue":"5","key":"41_CR12","first-page":"75","volume":"44","author":"D Zhan","year":"2012","unstructured":"Zhan, D., Feng, J., Nie, L., Xu, X.F.: Construction approach of confidence management software based on layered verification. J. Harbin Inst. Technol. 44(5), 75\u201380 (2012)","journal-title":"J. Harbin Inst. Technol."},{"key":"41_CR13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-642-31656-2_78","volume":"180","author":"QY Li","year":"2013","unstructured":"Li, Q.Y., Li, H.F., Wang, G.D.: Sensitivity analysis on the influence factors of software reliability based on diagnosis reasoning. Adv. Intell. Syst. Comput. 180, 557\u2013566 (2013)","journal-title":"Adv. Intell. Syst. Comput."},{"issue":"1","key":"41_CR14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MS.2015.4","volume":"32","author":"YP Liu","year":"2015","unstructured":"Liu, Y.P., Xu, C., Cheung, S.C.: Diagnosing energy efficiency and performance for mobile internetware applications. IEEE Softw. 32(1), 67\u201375 (2015)","journal-title":"IEEE Softw."},{"issue":"4","key":"41_CR15","first-page":"1110","volume":"32","author":"Y Yue","year":"2015","unstructured":"Yue, Y.: Multi-factor decision making for software reliability evaluation. Appl. Res. Comput. 32(4), 1110\u20131113 (2015)","journal-title":"Appl. Res. Comput."},{"issue":"1","key":"41_CR16","first-page":"41","volume":"7","author":"HJ Yang","year":"2013","unstructured":"Yang, H.J., Zheng, S.: Software evolution for moving into and moving within internetware paradigm. Int. J. Softw. Inform. 7(1), 41\u201361 (2013)","journal-title":"Int. J. Softw. Inform."},{"key":"41_CR17","unstructured":"Jia, Y.H., Zheng, S.: Software evolution based on service-oriented requirement in internetware. In: 4th International Conference on Computer Research and Development, IACSIT Press, Singapore, pp. 20\u201325 (2012)"},{"issue":"1","key":"41_CR18","first-page":"33","volume":"72","author":"P Panwar","year":"2013","unstructured":"Panwar, P., Garg, A.: Analysis of reliability and cost tradeoffs in architecture based software applications using a genetic algorithm. Int. J. Comput. Appl. 72(1), 33\u201337 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"41_CR19","unstructured":"Secure Software, Inc.: The CLASP Application Security Process (2005). http:\/\/www.ida.liu.se\/~TDDC90\/papers\/clasp_external.pdf"},{"key":"41_CR20","unstructured":"Chargo, J.T.: Automated software architecture extraction using graph-based clustering. Graduate thesis and dissertations, Iowa State University (2013)"},{"key":"41_CR21","unstructured":"SecureChange Project (2009\u20132012). http:\/\/www.securechange.eu\/"},{"issue":"1","key":"41_CR22","first-page":"108","volume":"43","author":"J Xu","year":"2013","unstructured":"Xu, J., Si, G., Yang, J., Wen, S., Zhang, B.: An internetware dependable entity model and trust measurement based on evaluation. Chin. Sci. Inf. Sci. 43(1), 108\u2013125 (2013)","journal-title":"Chin. Sci. Inf. Sci."},{"key":"41_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, P.S., Karsai, G.: Integrated analysis of temporal behavior of component-based distributed real-time embedded systems. In: International Symposium on Object Component Service Oriented Real Time Distributed Computing, pp. 50\u201357 (2015)","DOI":"10.1109\/ISORCW.2015.56"},{"key":"41_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-662-45730-6_8","volume-title":"Transactions on Petri Nets and Other Models of Concurrency IX","author":"J Liu","year":"2014","unstructured":"Liu, J., Liu, L.: A coloured Petri Net approach to the functional and performance analysis of SIP Non-INVITE transaction. In: Koutny, M., Haddad, S., Yakovlev, A. (eds.) Transactions on Petri Nets and Other Models of Concurrency IX. LNCS, vol. 8910, pp. 147\u2013177. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45730-6_8"},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Long, S.: Analysis of concurrent security protocols using colored Petri Nets. In: International Conference on Networking, pp. 227\u2013230 (2009)","DOI":"10.1109\/ICNDS.2009.62"},{"key":"41_CR26","doi-asserted-by":"publisher","unstructured":"Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning (2018). Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6938-9","DOI":"10.1007\/s11042-018-6938-9"},{"issue":"2","key":"41_CR27","doi-asserted-by":"crossref","first-page":"243","DOI":"10.4304\/jcp.9.2.243-256","volume":"9","author":"S Choosang","year":"2014","unstructured":"Choosang, S., Gordon, S.R.: A coloured Petri Net methodology and library for security analysis of network protocols. J. Comput. 9(2), 243\u2013256 (2014)","journal-title":"J. Comput."},{"issue":"2","key":"41_CR28","first-page":"273","volume":"56","author":"X Xie","year":"2018","unstructured":"Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273\u2013283 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:25:22Z","timestamp":1695032722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}