{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:08:10Z","timestamp":1778602090624,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,9,17]],"date-time":"2011-09-17T00:00:00Z","timestamp":1316217600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s10115-011-0442-0","type":"journal-article","created":{"date-parts":[[2011,9,16]],"date-time":"2011-09-16T10:22:02Z","timestamp":1316168522000},"page":"171-189","source":"Crossref","is-referenced-by-count":18,"title":["A software trustworthiness evaluation model using objective weight based evidential reasoning approach"],"prefix":"10.1007","volume":"33","author":[{"given":"Shuai","family":"Ding","sequence":"first","affiliation":[]},{"given":"Xi-Jun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Shan-Lin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,17]]},"reference":[{"key":"442_CR1","unstructured":"Anne I, Marko P (2007) Trustworthiness evaluation and testing of open source components. In: Proceeding of seventh international conference on quality software, vol 99. pp 316\u2013321"},{"issue":"1","key":"442_CR2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1(1): 11\u201333","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"6","key":"442_CR3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MS.2004.30","volume":"21","author":"V Basili","year":"2004","unstructured":"Basili V, Donzelli P, Asgari S (2004) A unified model of dependability: capturing dependability in context. IEEE Softw 21(6): 19\u201325","journal-title":"IEEE Softw"},{"issue":"21","key":"442_CR4","doi-asserted-by":"crossref","first-page":"4207","DOI":"10.1016\/j.ins.2010.07.009","volume":"180","author":"TY Chen","year":"2010","unstructured":"Chen TY, Li CH (2010) Determining objective weights with intuitionistic fuzzy entropy measures: a comparative analysis. Inf Sci 180(21): 4207\u20134222","journal-title":"Inf Sci"},{"key":"442_CR5","doi-asserted-by":"crossref","first-page":"1768","DOI":"10.1016\/j.cor.2008.05.002","volume":"36","author":"KS Chin","year":"2009","unstructured":"Chin KS, Wang YM, Poon GK et\u00a0al (2009) Yang. Failure mode and effects analysis using a group-based evidential reasoning approach. Comput Oper Res 36: 1768\u20131779","journal-title":"Comput Oper Res"},{"issue":"1","key":"442_CR6","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/TEM.2008.2009792","volume":"56","author":"KS Chin","year":"2009","unstructured":"Chin KS, Yang JB, Lam J et\u00a0al (2009) An evidential reasoning-interval based method for new product design assessment. IEEE Trans Eng Manag 56(1): 142\u2013156","journal-title":"IEEE Trans Eng Manag"},{"issue":"1","key":"442_CR7","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/TSE.2007.70739","volume":"33","author":"YS Dai","year":"2007","unstructured":"Dai YS, Xie M, Ng SH (2007) Uncertainty analysis in software reliability modeling by Bayesian with maximum-entropy principle. IEEE Trans Softw Eng 33(1): 781\u2013795","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"442_CR8","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TR.2005.853567","volume":"54","author":"TA Delong","year":"2005","unstructured":"Delong TA, Smith DT, Johnson BW (2005) Dependability metrics to assess safety-critical systems. IEEE Trans Reliab 54(3): 498\u2013505","journal-title":"IEEE Trans Reliab"},{"issue":"1","key":"442_CR9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2005.03.011","volume":"79","author":"P Dozelli","year":"2006","unstructured":"Dozelli P, Basili V (2006) A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project. J Syst Softw 79(1): 107\u2013119","journal-title":"J Syst Softw"},{"key":"442_CR10","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.ejor.2010.03.011","volume":"206","author":"C Fu","year":"2010","unstructured":"Fu C, Yang SL (2010) The group consensus based evidential reasoning approach for multiple attribute group decision analysis. Eur J Oper Res 206: 601\u2013608","journal-title":"Eur J Oper Res"},{"issue":"7","key":"442_CR11","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1016\/j.future.2010.03.009","volume":"26","author":"A Goscinski","year":"2010","unstructured":"Goscinski A, Brock M (2010) Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Gener Comput Syst 26(7): 947\u2013970","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"442_CR12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MC.2006.142","volume":"39","author":"W Hasselbring","year":"2006","unstructured":"Hasselbring W, Reussner R (2006) Toward trustworthy software systems. IEEE Comput 39(4): 91\u201392","journal-title":"IEEE Comput"},{"issue":"3","key":"442_CR13","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TR.1985.5222120","volume":"34","author":"H Joe","year":"2007","unstructured":"Joe H, Reid N (2007) On the software reliability models of Jelinski-Moranda and Littlewood. IEEE Trans Reliab 34(3): 216\u2013218","journal-title":"IEEE Trans Reliab"},{"issue":"5","key":"442_CR14","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MS.2004.1331309","volume":"21","author":"HW Jung","year":"2004","unstructured":"Jung HW, Kim SG, Chung CS (2004) Measuring software product quality: a survey of ISO\/IEC 9126. IEEE Softw 21(5): 88\u201392","journal-title":"IEEE Softw"},{"key":"442_CR15","unstructured":"Khan KM, Han J (2003) A security characterization framework for trustworthy component based software systems. In: 27th IEEE annual international computer software and applications conference, pp 164\u2013169"},{"issue":"1","key":"442_CR16","doi-asserted-by":"crossref","first-page":"24","DOI":"10.2991\/ijcis.2008.1.1.3","volume":"1","author":"XB Liu","year":"2008","unstructured":"Liu XB, Zhou M, Yang JB et\u00a0al (2008) Assessment of strategic R&D projects for car manufacturers based on the evidential reasoning approach. Int J Comput Intell Syst 1(1): 24\u201349","journal-title":"Int J Comput Intell Syst"},{"key":"442_CR17","unstructured":"Ma YF, Zhang M (2008) A computation model of trustworthy degree. In: International symposium on intelligent information technology application workshops, pp 523\u2013526"},{"issue":"2","key":"442_CR18","first-page":"10","volume":"28","author":"L Mei","year":"2003","unstructured":"Mei L, Xu YS (2003) An adaptive dependability model of component-based software. ACM SIGSOFT Softw Eng Notes 28(2): 10\u201314","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"issue":"1","key":"442_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0888-613X(05)80003-9","volume":"8","author":"NR Pal","year":"1993","unstructured":"Pal NR, Bezdek JC, Hemasinha R (1993) Uncertainty measures for evidential reasoning II : a new measure of total uncertainty. Int J Approx Reason 8(1): 1\u201316","journal-title":"Int J Approx Reason"},{"key":"442_CR20","doi-asserted-by":"crossref","unstructured":"Paul RA, Yen IL, Bastani F et\u00a0al (2008) An ontology-based integrated assessment framework for high-assurance systems. In: The IEEE international conference on semantic computing, pp 386\u2013393","DOI":"10.1109\/ICSC.2008.46"},{"issue":"1","key":"442_CR21","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.ejor.2007.05.006","volume":"189","author":"M Poyhonen","year":"2008","unstructured":"Poyhonen M, Hamalainen RP (2008) On the convergence of multiatrribute weighting methods. Eur J Oper Res 189(1): 132\u2013145","journal-title":"Eur J Oper Res"},{"issue":"10","key":"442_CR22","doi-asserted-by":"crossref","first-page":"4738","DOI":"10.1016\/j.matdes.2010.05.014","volume":"31","author":"RV Rao","year":"2010","unstructured":"Rao RV, Patel BK (2010) A subjective and objective integrated multiple attribute decision making method for material selection. Mater Des 31(10): 4738\u20134747","journal-title":"Mater Des"},{"key":"442_CR23","doi-asserted-by":"crossref","unstructured":"Razavi M, Aliee FS, Badie K (2011) An AHP-based approach toward enterprise architecture analysis based on enterprise architecture quality attributes. Knowledge and information systems. doi: 10.1007\/s10115-010-0312-1","DOI":"10.1007\/s10115-010-0312-1"},{"issue":"3","key":"442_CR24","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11432-010-0069-x","volume":"53","author":"CX Shen","year":"2010","unstructured":"Shen CX, Zhang HG, Wang HM (2010) Research on trusted computed and its development. Sci China-Series F Inf Sci 53(3): 405\u2013433","journal-title":"Sci China-Series F Inf Sci"},{"key":"442_CR25","unstructured":"Shi HL, Ma J, Zou FY (2008) Software dependability evaluation model based on fuzzy theory. In: International conference on computer science and information technology, pp 102\u2013106"},{"issue":"6","key":"442_CR26","first-page":"1","volume":"31","author":"B Steffen","year":"2008","unstructured":"Steffen B, Wihelm H, Alexandra P et\u00a0al (2008) Trustworthy software systems: a discussion of basic concepts and terminology. ACM SIGSOFT Softw Eng Notes Arch 31(6): 1\u201318","journal-title":"ACM SIGSOFT Softw Eng Notes Arch"},{"issue":"1","key":"442_CR27","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10115-009-0263-6","volume":"25","author":"F Tao","year":"2010","unstructured":"Tao F, Zhao DM, Zhang L (2010) Resource service optimal-selection based on intuitionistic fuzzy set and non-functionality QoS in manufacturing grid system. Knowl Inf Syst 25(1): 185\u2013208","journal-title":"Knowl Inf Syst"},{"issue":"7","key":"442_CR28","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/S0898-1221(03)90131-3","volume":"46","author":"K Tokuno","year":"2003","unstructured":"Tokuno K, Yamada S (2003) Relationship between software availability measurement and the number of restorations with imperfect debugging. Comput Math Appl 46(7): 1155\u20131163","journal-title":"Comput Math Appl"},{"key":"442_CR29","unstructured":"Uzunov K, Nguyen T (2008) Dependability of software in airborne mission systems. Technical Report, DSTO-TR-2111, Defence Science and Technology Organization, Australian Government Department of Defence, http:\/\/dspace.dsto.defence.gov.au\/dspace\/bitstream\/1947\/9335\/1\/DSTO-TR-2111%20PR.pdf"},{"issue":"1","key":"442_CR30","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1023\/A:1023679926998","volume":"11","author":"J Voas","year":"2003","unstructured":"Voas J (2003) Trusted software\u2019s holy grail. Softw Qual J 11(1): 9\u201317","journal-title":"Softw Qual J"},{"issue":"2","key":"442_CR31","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/S0164-1212(99)00143-0","volume":"52","author":"J Voas","year":"2000","unstructured":"Voas J, Payne J (2000) Dependability certification of software components. J Syst Softw 52(2): 165\u2013172","journal-title":"J Syst Softw"},{"issue":"6","key":"442_CR32","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/s11432-006-2024-4","volume":"49","author":"HM Wang","year":"2006","unstructured":"Wang HM, Tang YB, Yin G et\u00a0al (2006) Trustworthiness of internet-based software. Sci China-Series F Inf Sci 49(6): 759\u2013773","journal-title":"Sci China-Series F Inf Sci"},{"issue":"5","key":"442_CR33","doi-asserted-by":"crossref","first-page":"8980","DOI":"10.1016\/j.eswa.2008.11.035","volume":"36","author":"TC Wang","year":"2009","unstructured":"Wang TC, Lee HD (2009) Developing a fuzzy TOPSIS approach based on subjective weights and objective weights. Expert Syst Appl 36(5): 8980\u20138985","journal-title":"Expert Syst Appl"},{"issue":"4","key":"442_CR34","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0166-5316(99)00052-8","volume":"40","author":"JG Water","year":"2000","unstructured":"Water JG (2000) Software dependability evaluation based on Markov usage models. Perform Eval 40(4): 199\u2013222","journal-title":"Perform Eval"},{"issue":"3","key":"442_CR35","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1007\/s10115-009-0258-3","volume":"25","author":"GW Wei","year":"2010","unstructured":"Wei GW (2010) Extension of TOPSIS method for 2-tuple linguistic multiple attribute group decision making with incomplete weight information. Knowl Inf Syst 25(3): 623\u2013634","journal-title":"Knowl Inf Syst"},{"issue":"5","key":"442_CR36","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/1125944.1125947","volume":"49","author":"B Whitworth","year":"2006","unstructured":"Whitworth B, Fjermestad J, Mahinda D (2006) The web of system performance. Commun ACM 49(5): 93\u201399","journal-title":"Commun ACM"},{"issue":"1","key":"442_CR37","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s10115-009-0248-5","volume":"25","author":"WH Xu","year":"2009","unstructured":"Xu WH, Zhang XY, Zhong JM et\u00a0al (2009) Attribute reduction in ordered information systems based on evidence theory. Knowl Inf Syst 25(1): 169\u2013184","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"442_CR38","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1080\/03081078308960825","volume":"9","author":"RR Yager","year":"1983","unstructured":"Yager RR (1983) Entropy and specificity in a mathematical theory of evidence. Int J Gen Syst 9(4): 249\u2013260","journal-title":"Int J Gen Syst"},{"issue":"1","key":"442_CR39","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0377-2217(99)00441-5","volume":"131","author":"JB Yang","year":"2001","unstructured":"Yang JB (2001) Rule and utility based evidential reasoning approach for multi-attribute decision under uncertainties. Eur J Oper Res 131(1): 31\u201361","journal-title":"Eur J Oper Res"},{"issue":"1","key":"442_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/21.259681","volume":"24","author":"JB Yang","year":"1994","unstructured":"Yang JB, Singh MG (1994) An evidential reasoning approach for multiple attribute decision making with uncertainly. IEEE Trans Syst Man Cybern 24(1): 1\u201318","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"3","key":"442_CR41","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSMCA.2002.802746","volume":"32","author":"JB Yang","year":"2002","unstructured":"Yang JB, Xu DL (2002) On the evidential reasoning algorithm for multiattribute decision analysis under uncertainly. IEEE Trans Syst Man Cybern Part A Syst Hum 32(3): 289\u2013304","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Hum"},{"issue":"1","key":"442_CR42","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.ejor.2004.09.017","volume":"171","author":"JB Yang","year":"2006","unstructured":"Yang JB, Wang YM, Xu DL et\u00a0al (2006) The evidential reasoning approach for MADA under both probabilistic and fuzzy uncertainties. Eur J Oper Res 171(1): 309\u2013343","journal-title":"Eur J Oper Res"},{"issue":"5","key":"442_CR43","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/s11859-008-0507-4","volume":"13","author":"Y Zhang","year":"2008","unstructured":"Zhang Y, Fang B, Xu CY (2008) Trustworthy metrics models for internetware. Wuhan University J Nat Sci 13(5): 547\u2013552","journal-title":"Wuhan University J Nat Sci"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-011-0442-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-011-0442-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-011-0442-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T15:38:31Z","timestamp":1560613111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-011-0442-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,17]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["442"],"URL":"https:\/\/doi.org\/10.1007\/s10115-011-0442-0","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,17]]}}}