{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:04:58Z","timestamp":1730210698807,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/cscwd.2010.5472003","type":"proceedings-article","created":{"date-parts":[[2010,6,4]],"date-time":"2010-06-04T14:12:22Z","timestamp":1275660742000},"page":"43-47","source":"Crossref","is-referenced-by-count":5,"title":["Research on an analysis method for software trustworthiness based on rules"],"prefix":"10.1109","author":[{"given":"Tie","family":"Bao","sequence":"first","affiliation":[]},{"given":"Shufen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Trustworthy Computing","year":"2006","author":"gates","key":"ref4"},{"journal-title":"Trusted Computing Group","year":"2006","key":"ref3"},{"journal-title":"Communicating Sequential Processes [M]","year":"1985","author":"hoare","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1198239"},{"key":"ref11","first-page":"225","article-title":"Research on a formal description method of network behavior based on communication sequential process [J]","volume":"l","author":"tie","year":"2008","journal-title":"ICPCA08-2008 3rd International Conference on Pervasive Computing and Applications"},{"key":"ref5","first-page":"1156","article-title":"Trusted Principle of Internet Software [J]","volume":"10","author":"huai-min","year":"2006","journal-title":"Science in China(Series E Information Sciences)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2004.1358014"},{"journal-title":"Principles of the Business Rule Approach [M]","year":"2004","author":"ross ronald","key":"ref7"},{"journal-title":"Information technology security techniques evaluation criteria for IT security","year":"2006","key":"ref2"},{"key":"ref9","first-page":"599","article-title":"A method for network data collection and processing in the pervasive computing environment[J]","author":"tie","year":"2007","journal-title":"First International Symposium on Pervasive Computing and Applications"},{"key":"ref1","first-page":"3521","article-title":"Trust in pervasive computing [J]","volume":"25","author":"jian-quan","year":"2008","journal-title":"Application Research of Computers"}],"event":{"name":"2010 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2010,4,14]]},"location":"Shanghai, China","end":{"date-parts":[[2010,4,16]]}},"container-title":["The 2010 14th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5466608\/5471868\/05472003.pdf?arnumber=5472003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:38:37Z","timestamp":1489887517000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5472003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2010.5472003","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}