{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T22:40:12Z","timestamp":1739054412497,"version":"3.37.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1007\/s11390-009-9231-6","type":"journal-article","created":{"date-parts":[[2009,4,8]],"date-time":"2009-04-08T18:56:37Z","timestamp":1239216997000},"page":"373-385","source":"Crossref","is-referenced-by-count":3,"title":["A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments"],"prefix":"10.1007","volume":"24","author":[{"given":"Feng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,12]]},"reference":[{"key":"9231_CR1","unstructured":"Autonomic computing: IBM's perspective on the state of information technology. IBM, 2001, http:\/\/www.research.ibm.com\/autonomic\/manifesto\/autonomic computing.pdf ."},{"key":"9231_CR2","unstructured":"Mary Shaw. Architectural requirements for computing with coalitions of resources. In Proc. 1st Working International Federation Processing Conference on Software Architecture, Netherland: Kluwer, 1999."},{"issue":"10","key":"9231_CR3","first-page":"1037","volume":"36","author":"J Lu","year":"2006","unstructured":"Lu J, Ma X, Tao X, Xu F, Hu H. Research and progress on Internetware. Science in China (Series E), 2006, 36(10): 1037\u20131080.","journal-title":"Science in China (Series E)"},{"key":"9231_CR4","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/ICSM.1997.624236","volume-title":"Proc. 13th IEEE International Conference on Software Maintenance","author":"H Ziv","year":"1997","unstructured":"Ziv H, Richardson D J. Constructing Bayesian-network models of software testing and maintenance uncertainties. In Proc. 13th IEEE International Conference on Software Maintenance, Los Alamitos, California: IEEE Computer Society Press, 1997, pp.100\u2013109."},{"issue":"12","key":"9231_CR5","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1109\/TSE.1985.232181","volume":"11","author":"J P Cavano","year":"1985","unstructured":"Cavano J P. Toward high confidence software. IEEE Trans. Software Eng., 1985, 11(12): 1449\u20131455.","journal-title":"IEEE Trans. Software Eng."},{"key":"9231_CR6","unstructured":"High confidence software and systems research needs. White Paper, IWG\/IT R&D, USA, 2001."},{"key":"9231_CR7","doi-asserted-by":"crossref","unstructured":"Bowen T, Wigle G, Tsai J. Specification of software quality attributes. RADC-TR-85-37, Oct. 1984.","DOI":"10.21236\/ADA153988"},{"key":"9231_CR8","doi-asserted-by":"crossref","unstructured":"Mary J Harrold. Testing: A roadmap. In Proc. 22nd International Conference on Software Engineering, Limerick, Ireland, June 4\u201311, 2000, pp.61\u201372.","DOI":"10.1145\/336512.336532"},{"key":"9231_CR9","unstructured":"Mary Shaw. Everyday dependability for everyday needs. In Proc. 13th International Symposium on Software Reliability Engineering, IEEE Computer Society, Seattle\/Redmond, USA, Nov. 11\u201314, 2002, pp.7\u201311."},{"key":"9231_CR10","first-page":"164","volume-title":"Proc. 17th Symposium on Security and Privacy","author":"M Blaze","year":"1996","unstructured":"Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In Proc. 17th Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1996, pp.164\u2013173."},{"key":"9231_CR11","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Strauss M. Compliance checking in the PolicyMaker trust management system. In Proc. the Financial Cryptography'98, LNCS 1465, 1998, pp.254\u2013274.","DOI":"10.1007\/BFb0055488"},{"key":"9231_CR12","first-page":"59","volume-title":"Cambridge 1998 Security Protocols International Workshop","author":"M Blaze","year":"1999","unstructured":"Blaze M, Feighenbaum J, Keromytis A D. Keynote: Trust management for public-key infrastructures. In Cambridge 1998 Security Protocols International Workshop, Christianson B, Crispo B, William S et al. (eds.), Berlin: Springer-Verglag, 1999, pp.59\u201363."},{"key":"9231_CR13","unstructured":"Wang W, Wu Y, Chen M. An architecture-based software reliability model. In Proc. Pacific Rim International Symp. Dependable Computing, 1999."},{"issue":"3","key":"9231_CR14","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0164-1212(02)00080-8","volume":"66","author":"R Reussner","year":"2003","unstructured":"Reussner R, Schmidt H, Poernomo I. Reliability prediction for component-based software architectures. Journal of Systems and Software, Elsevier Science Inc, 2003, 66(3): 241\u2013252.","journal-title":"Journal of Systems and Software"},{"key":"9231_CR15","doi-asserted-by":"crossref","unstructured":"Lee S W, Gandhi R A. Ontology-based active requirements engineering framework. In Proc. APSEC 2005, Taipei, Dec. 15\u201317, pp.481\u2013490.","DOI":"10.1109\/APSEC.2005.86"},{"key":"9231_CR16","unstructured":"Martin D et al. OWL-S: Semantic markup for Web services. http:\/\/www.w3.org\/Submission\/2004\/SUBM-OWLS-20041122\/ ."},{"key":"9231_CR17","first-page":"7","volume":"18","author":"J Dominique","year":"2005","unstructured":"Dominique J, Fensel D, Roman D. Semantic Web services with the Web service modeling ontology (WSMO). Agentlinks News, November 2005, (18): 7\u20139.","journal-title":"Agentlinks News"},{"key":"9231_CR18","unstructured":"McKnight D H, Chervany N L. The meanings of trust. Technical Report WP9604, Univ. Minnesota Management Information Systems Research Center, 1996."},{"issue":"1","key":"9231_CR19","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N Li","year":"2003","unstructured":"Li N, Winsborough W H, Mitchell J C. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35\u201386.","journal-title":"Journal of Computer Security"},{"issue":"12A","key":"9231_CR20","first-page":"2019","volume":"30","author":"X P Tao","year":"2002","unstructured":"Tao X P, Lu J, Ma X X et al. Research on mobile agent reference models. Acta Ecletronica Sinica, 2002, 30(12A): 2019\u20132021. (in Chinese with English abstract)","journal-title":"Acta Ecletronica Sinica"},{"issue":"12","key":"9231_CR21","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TSE.1985.232177","volume":"11","author":"A L Goel","year":"1985","unstructured":"Goel A L. Software reliability models: Assumptions, limitations and applicability. IEEE Trans. Software Engineering, 1985, 11(12): 1411\u20131425.","journal-title":"IEEE Trans. Software Engineering"},{"key":"9231_CR22","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TDSC.2007.4","volume":"4","author":"S S Gokhale","year":"2007","unstructured":"Gokhale S S. Architecture-based software reliability analysis: Overview and limitations. IEEE Transactions on Dependable and Secure Computing, 2007, 4: 32\u201340.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9231_CR23","unstructured":"Goseva-Popstojanova K, Trivedi K S. Architecture based software reliability. In Proc. (ASSM 2000) Int. Conf. Applied Stochastic System Modeling, Kyoto, Japan, March 2000, pp.41\u201352."},{"key":"9231_CR24","unstructured":"Shaw M, Garlan D. Software Architecture: Perspectives on an Emerging Discipline. Prentice Hall, Apr. 1996."},{"issue":"1","key":"9231_CR25","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W M P Aalst van der","year":"1998","unstructured":"van der Aalst W M P. The application of Petri nets to work-flow management. The Journal of Circuits, Systems and Computers, 1998, 8(1): 21\u201366.","journal-title":"The Journal of Circuits, Systems and Computers"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9231-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-009-9231-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9231-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T22:24:39Z","timestamp":1739053479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-009-9231-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["9231"],"URL":"https:\/\/doi.org\/10.1007\/s11390-009-9231-6","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}