{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:24:53Z","timestamp":1725531893079},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642016790"},{"type":"electronic","value":"9783642016806"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01680-6_35","type":"book-chapter","created":{"date-parts":[[2009,5,7]],"date-time":"2009-05-07T11:19:35Z","timestamp":1241695175000},"page":"389-401","source":"Crossref","is-referenced-by-count":17,"title":["Process Trustworthiness as a Capability Indicator for Measuring and Improving Software Trustworthiness"],"prefix":"10.1007","author":[{"given":"Ye","family":"Yang","sequence":"first","affiliation":[]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingshu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Boehm, B.: A view of 20th and 21st century software engineering. In: International Conference on Software Engineering. Proceedings of the 28th international conference on Software Engineering, pp., 12\u201329 (2006)","DOI":"10.1145\/1134285.1134288"},{"key":"35_CR2","unstructured":"Nelson, M., Clark, J., Spurlock, M.A.: Curing the Software Requirements and Cost Estimating Blues. PM: November\/December (1999)"},{"key":"35_CR3","unstructured":"Department of Defense, National Computer Security Center: Trusted Computer System Evaluation Criteria. DoD 5200.28-STD (1985)"},{"issue":"6","key":"35_CR4","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1145\/78973.78974","volume":"33","author":"D. Parnas","year":"1990","unstructured":"Parnas, D., et al.: Evaluation of Safety-Critical Software. CACM\u00a033(6), 636\u2013648 (1990)","journal-title":"CACM"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Amoroso, E.C.T., Watson, J., Weiss, J.: A process-oriented methodology for assessing and improving software trustworthiness. In: Proceedings of the 2nd ACM Conference on Computer and communications security, Virginia, USA, pp. 39\u201350 (1994)","DOI":"10.1145\/191177.191188"},{"key":"35_CR6","unstructured":"Capability Maturity Model Integration Version 1.2 Overview, http:\/\/www.sei.cmu.edu\/cmmi\/adoption\/pdf\/cmmi-overview07.pdf"},{"key":"35_CR7","unstructured":"Common Criteria Portal, http:\/\/www.commoncriteriaportal.org\/"},{"key":"35_CR8","unstructured":"DACS, Software Project Management for Software Assurance: A State-of-the-Art-Report, September 30 (2007)"},{"key":"35_CR9","unstructured":"DACS and IATAC, Software Security Assurance: A State-of-the-Art-Report, July 31 (2007)"},{"key":"35_CR10","unstructured":"United States Federal Aviation Administration, Safety and Security Extension for integrated Capability Maturity Model (September 2004)"},{"key":"35_CR11","unstructured":"CMU, Systems Security Engineering Capability Maturity Model SSE-CMM: Model Description Document, Version 3.0, June 15 (2003)"},{"key":"35_CR12","unstructured":"International Standards Organization, ISO 9126, Ist edn. (2001)"},{"key":"35_CR13","unstructured":"International Standards Organization, ISO 27000, Ist edn. (2005)"},{"key":"35_CR14","unstructured":"International Standards Organization, ISO 9001, 2nd edn. (2005)"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Tan, T., He, M., et al.: An Analysis to Understand Software Trustworthiness. Accepted by the 2008 International Symposium on Trusted Computing, China (November 2008)","DOI":"10.1109\/ICYCS.2008.484"},{"key":"35_CR16","unstructured":"Shu, F., Jiang, N., Gou, L.: Technical Report: A Trustworthiness Measurement Model. ISCAS\/iTechs Technical Report #106 (November 2008)"},{"key":"35_CR17","volume-title":"Applied Software Measurement: Assuring Productivity and Quality","author":"C. Jones","year":"1997","unstructured":"Jones, C.: Applied Software Measurement: Assuring Productivity and Quality. McGraw-Hill, New York (1997)"},{"key":"35_CR18","volume-title":"Software Cost Estimation with COCOMO II","author":"B.W. Boehm","year":"2000","unstructured":"Boehm, B.W., et al.: Software Cost Estimation with COCOMO II. Prentice-Hall, NY (2000)"},{"key":"35_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-72426-1_20","volume-title":"Software Process Dynamics and Agility","author":"Q. Wang","year":"2007","unstructured":"Wang, Q., Gou, L., et al.: An Empirical Study on Establishing Quantitative Management Model for Testing Process. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2007. LNCS, vol.\u00a04470, pp. 233\u2013245. Springer, Heidelberg (2007)"},{"key":"35_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-79588-9_32","volume-title":"Making Globally Distributed Software Development a Success Story","author":"L. Gou","year":"2008","unstructured":"Gou, L., Wang, Q., et al.: Quantitatively Managing Defects for Iterative Projects: An Industrial Experience Report in China. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol.\u00a05007, pp. 369\u2013380. Springer, Heidelberg (2008)"},{"key":"35_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-79588-9_14","volume-title":"Making Globally Distributed Software Development a Success Story","author":"S. Zhang","year":"2008","unstructured":"Zhang, S., Wang, Y., et al.: Capability Assessment of Individual Software Development Processes Using Software Repositories and DEA. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol.\u00a05007, pp. 147\u2013159. Springer, Heidelberg (2008)"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, M.: Measuring and improving software process in China. In: 2005 International Symposium on Empirical Software Engineering (2005)","DOI":"10.1109\/ISESE.2005.1541827"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Yang, D., Wu, D., et al.: WikiWinWin: A Wiki Based System for Collaborative Requirements Negotiation. In: HICSS (2008)","DOI":"10.1109\/HICSS.2008.502"},{"key":"35_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-79588-9_10","volume-title":"Making Globally Distributed Software Development a Success Story","author":"Y. Li","year":"2008","unstructured":"Li, Y., Li, J., et al.: Requirement-Centric Traceability for Change Impact Analysis: A Case Study. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol.\u00a05007, pp. 100\u2013111. Springer, Heidelberg (2008)"},{"key":"35_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-79588-9_13","volume-title":"Making Globally Distributed Software Development a Success Story","author":"J. Li","year":"2008","unstructured":"Li, J., Hou, L., et al.: An Empirically-Based Process to Improve the Practice of Requirement Review. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol.\u00a05007, pp. 135\u2013146. Springer, Heidelberg (2008)"},{"key":"35_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-79588-9_27","volume-title":"Making Globally Distributed Software Development a Success Story","author":"D. Liu","year":"2008","unstructured":"Liu, D., Wang, Q., Xiao, J., Li, J., Li, H.: RVSim: A Simulation Approach to Predict the Impact of Requirements Volatility on Software Project Plans. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol.\u00a05007, pp. 307\u2013315. Springer, Heidelberg (2008)"},{"key":"35_CR27","unstructured":"Dai, J., Xiao, J., Wang, Q., Li, M., Li, H.: Dynamically Optimize Process Execution Based on Process Agent. Accepted by 2008 International Conference on Software Engineering and Knowledge Engineering (SEKE 2008) (2008)"},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, Z., Wei, L., Xu, W.: Feather Selection via Least Squares Support Feature Machine. International Journal of Information Technology & Decision Making\u00a06(4) (2007)","DOI":"10.1142\/S0219622007002733"},{"key":"35_CR29","unstructured":"Du, J., Tan, T., He, M., et al.: Technical Report: A Process-Centric Approach to Assure Software Trustworthiness. ISCAS\/iTechs Technical Report #106 (September 2008)"},{"key":"35_CR30","unstructured":"Wang, Q., Yang, Y.: Technical Report: A Process-Centric Methodology to Software Trustworthiness Assurance. ISCAS\/iTechs Technical Report #105 (June 2008)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Software Development Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01680-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:47:24Z","timestamp":1558291644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01680-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642016790","9783642016806"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01680-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}