{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:35:24Z","timestamp":1725557724712},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143465"},{"type":"electronic","value":"9783642143472"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14347-2_26","type":"book-chapter","created":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T00:11:27Z","timestamp":1277079087000},"page":"297-308","source":"Crossref","is-referenced-by-count":7,"title":["A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes"],"prefix":"10.1007","author":[{"given":"Haopeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fengdi","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Yang, Y., Wang, Q., Li, M.: Proceedings of the International Conference on Software Process, Vancouver, B.C., Canada (2009)"},{"key":"26_CR2","unstructured":"Shu, F., Jiang, N., Gou, L.: Technical Report: A Trustworthiness Measurement Model. ISCAS\/iTechs Technical Report #106 (2008)"},{"key":"26_CR3","volume-title":"The Analytic Hierarchy Process","author":"T.L. Saaty","year":"1990","unstructured":"Saaty, T.L.: The Analytic Hierarchy Process. McGraw-Hill, New York (1990)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Amoroso, E., Taylor, C., et al.: A process-oriented methodology for assessing and improving software trustworthiness. In: 2nd ACM Conference on Computer and communications security, Virginia, USA, pp. 39\u201350 (1994)","DOI":"10.1145\/191177.191188"},{"key":"26_CR5","unstructured":"Amoroso, E., Nguyen, T., et al.: Toward an approach to measuring software trust. In: IEEE Computer Society Symposium on Research in Security and Privacy (1991)"},{"key":"26_CR6","unstructured":"CMMI Product Team. CMMI\u00ae for Development, Version 1.2. Pittsburgh, PA, Carnegie Mellon Software Engineering Insitute (2006)"},{"key":"26_CR7","volume-title":"CMMI\u00ae: Guidelines for Process Integration and Product Improvement","author":"M.B. Chrissis","year":"2006","unstructured":"Chrissis, M.B., Konrad, M., Shrum, S.: CMMI\u00ae: Guidelines for Process Integration and Product Improvement. Addison-Wesley Publishing Company, Boston (2006)"},{"key":"26_CR8","unstructured":"Wang, Q., Yang, Y.: Technical Report: A Process-Centric Methodology to Software Trustworthiness Assurance. ISCAS\/iTechs Technical Report #105 (2008)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Fuzzy Sets. Information Control, 338\u2013353 (1965)","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"26_CR10","volume-title":"Fuzzy Sets and Fuzzy Logic. Theory and Applications","author":"G.J. Klir","year":"1995","unstructured":"Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic. Theory and Applications. Prentice Hall, New Jersey (1995)"},{"key":"26_CR11","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2006)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, M.: Software Process Management: Practices in China. In: Software Process Workshop, Beijing (2005)","DOI":"10.1007\/11608035_27"},{"key":"26_CR13","unstructured":"Wang, Q., Li, M.: Measuring and improving software process in China. In: International Symposium on Empirical Software Engineering (2005)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Tan, T., He, M., et al.: An Analysis to Understand Software Trustworthiness. In: The 9th International Conference for Young Computer Scientists (2008)","DOI":"10.1109\/ICYCS.2008.484"},{"key":"26_CR15","unstructured":"Du, J., Tan, T., He, M., et al.: Technical Report: A Process-Centric Approach to Assure Software Trustworthiness. ISCAS\/iTechs Technical Report #106 (2008)"}],"container-title":["Lecture Notes in Computer Science","New Modeling Concepts for Today\u2019s Software Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14347-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:00:07Z","timestamp":1558292407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14347-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143465","9783642143472"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14347-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}