{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:34:40Z","timestamp":1648650880335},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T00:00:00Z","timestamp":1473724800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11432-015-0856-7","type":"journal-article","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T07:38:38Z","timestamp":1474357118000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-objective evaluation and optimization on trustworthy computing"],"prefix":"10.1007","volume":"59","author":[{"given":"Chuang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chao","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,13]]},"reference":[{"key":"856_CR1","first-page":"145","volume":"22","author":"K Liu","year":"2008","unstructured":"Liu K, Shan Z G, Wang J, et al. Overview on major research plan of trustworthy software. Bulletin National Natural Sci Found China, 2008, 22: 145\u2013151","journal-title":"Bulletin National Natural Sci Found China"},{"key":"856_CR2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11235-011-9420-9","volume":"51","author":"H Tao","year":"2012","unstructured":"Tao H, Chen Y. A new metric model for trustworthiness of softwares. Telecommun Syst, 2012, 51: 95\u2013105","journal-title":"Telecommun Syst"},{"key":"856_CR3","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1360\/N092014-00046","volume":"45","author":"J Wang","year":"2015","unstructured":"Wang J, Chen Y X, Gu B, et al. An approach to measure and grading software trust for spacecraft software (in Chinese). Sci Sin Tech, 2015, 45: 221\u2013228","journal-title":"Sci Sin Tech"},{"key":"856_CR4","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.ress.2014.09.019","volume":"133","author":"T P K Nguyen","year":"2015","unstructured":"Nguyen T P K, Beugin J, Marais J. Method for evaluating an extended fault tree to analyse the dependability of complex systems: application to a satellite-based railway system. Reliab Eng Syst Safe, 2015, 133: 300\u2013313","journal-title":"Reliab Eng Syst Safe"},{"key":"856_CR5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TR.2014.2299674","volume":"63","author":"Y C Mo","year":"2014","unstructured":"Mo Y C. A multiple-valued decision-diagram-based approach to solve dynamic fault trees. IEEE Trans Reliab, 2014, 63: 81\u201393","journal-title":"IEEE Trans Reliab"},{"key":"856_CR6","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.measurement.2015.07.003","volume":"74","author":"M Catelani","year":"2015","unstructured":"Catelani M, Ciani L, Venzi M. Sensitivity analysis with MC simulation for the failure rate evaluation and reliability assessment. Measurement, 2015, 74: 150\u2013158","journal-title":"Measurement"},{"key":"856_CR7","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.tcs.2015.07.047","volume":"611","author":"M Xu","year":"2016","unstructured":"Xu M, Zhang L, Jansen D N, et al. Multiphase until formulas over Markov reward models: an algebraic approach. Theor Comput Sci, 2016, 611: 116\u2013135","journal-title":"Theor Comput Sci"},{"key":"856_CR8","doi-asserted-by":"crossref","first-page":"602","DOI":"10.4028\/www.scientific.net\/AMM.513-517.602","volume":"513","author":"J X Zhu","year":"2014","unstructured":"Zhu J X. A trustworthy software designing approach and credibility evaluation. Appl Mecha Mater, 2014, 513: 602\u2013605","journal-title":"Appl Mecha Mater"},{"key":"856_CR9","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2785966","volume":"18","author":"P Alexander","year":"2015","unstructured":"Alexander P, Pike L, Loscocco P, et al. Model checking distributed mandatory access control policies. ACM Trans Inf Syst Secur (TISSEC), 2015, 18: 6","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"856_CR10","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/IWQoS.2014.6914314","volume-title":"Proceedings of IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong","author":"J Hu","year":"2014","unstructured":"Hu J, Lin C, Li X, et al. Scalability of control planes for software defined networks: modeling and evaluation. In: Proceedings of IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong, 2014. 147\u2013152"},{"key":"856_CR11","first-page":"1","volume-title":"Proceedings of IEEE International Conference onWeb Services (ICWS), Anchorage","author":"Y Chen","year":"2014","unstructured":"Chen Y, Huang J, Lin C. Partial selection: an efficient approach for QoS-aware web service composition. In: Proceedings of IEEE International Conference onWeb Services (ICWS), Anchorage, 2014. 1\u20138"},{"key":"856_CR12","first-page":"1907","volume":"38","author":"C Lin","year":"2015","unstructured":"Lin C, Chen Y, Huang J, et al. A survey on models and solutions of multi-objective optimization for QoS in services computing. Chinese J Comput, 2015, 38: 1907\u20131923","journal-title":"Chinese J Comput"},{"key":"856_CR13","volume-title":"Practical Bilevel Optimization: Algorithms and Applications","author":"J F Bard","year":"2013","unstructured":"Bard J F. Practical Bilevel Optimization: Algorithms and Applications. Berlin: Springer Science Business Media, 2013"},{"key":"856_CR14","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s11424-014-2128-7","volume":"27","author":"M Jiang","year":"2014","unstructured":"Jiang M, Meng Z, Shen R, et al. A quadratic objective penalty function for bilevel programming. J Syst Sci Complex, 2014, 27: 327\u2013337","journal-title":"J Syst Sci Complex"},{"key":"856_CR15","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TCYB.2013.2245892","volume":"44","author":"A Zhou","year":"2014","unstructured":"Zhou A, Jin Y, Zhang Q. A population prediction strategy for evolutionary dynamic multiobjective optimization. IEEE Trans Cybernet, 2014, 44: 40\u201353","journal-title":"IEEE Trans Cybernet"},{"key":"856_CR16","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s00500-014-1477-4","volume":"19","author":"Y Wu","year":"2015","unstructured":"Wu Y, Jin Y, Liu X. A directed search strategy for evolutionary dynamic multiobjective optimization. Soft Comput, 2015, 19: 3221\u20133235","journal-title":"Soft Comput"},{"key":"856_CR17","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1016\/j.cor.2011.11.011","volume":"40","author":"Q Lin","year":"2013","unstructured":"Lin Q, Chen J. A novel micro-population immune multiobjective optimization algorithm. Comput Oper Res, 2013, 40: 1590\u20131601","journal-title":"Comput Oper Res"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0856-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0856-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0856-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:13:08Z","timestamp":1498345988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0856-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,13]]},"references-count":17,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["856"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0856-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,13]]},"article-number":"108102"}}