{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:18:28Z","timestamp":1770751108409,"version":"3.50.0"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2006,11,1]],"date-time":"2006-11-01T00:00:00Z","timestamp":1162339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2006,11]]},"abstract":"<jats:p>Basic concepts and terminology for trustworthy software systems are discussed. Our discussion of definitions for terms in the domain of trustworthy software systems is based on former achievements in dependable, trustworthy and survivable systems. We base our discussion on the established literature and on approved standards. These concepts are discussed in the context of our graduate school TrustSoft on trustworthy software systems. In TrustSoft, we consider trustworthiness of software systems as determined by correctness, safety, quality of service (performance, reliability, availability), security, and privacy. Particular means to achieve trustworthiness of component-based software systems - as investigated in TrustSoft - are formal verification, quality prediction and certification; complemented by fault diagnosis and fault tolerance for increased robustness.<\/jats:p>","DOI":"10.1145\/1218776.1218781","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:52:18Z","timestamp":1175802738000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Trustworthy software systems"],"prefix":"10.1145","volume":"31","author":[{"given":"Steffen","family":"Becker","sequence":"first","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Wilhelm","family":"Hasselbring","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Alexandra","family":"Paul","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Marko","family":"Boskovic","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Heiko","family":"Koziolek","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Jan","family":"Ploski","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Abhishek","family":"Dhama","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Henrik","family":"Lipskoch","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Matthias","family":"Rohr","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Daniel","family":"Winteler","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Simon","family":"Giesecke","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Roland","family":"Meyer","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Mani","family":"Swaminathan","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Jens","family":"Happe","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Margarete","family":"Muhle","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]},{"given":"Timo","family":"Warns","sequence":"additional","affiliation":[{"name":"Carl-von-Ossietzky University of Oldenburg, Oldenburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2006,11]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Security and Dependability of the 7th Framework Programme","author":"Achatz R.","year":"2006","unstructured":"R. Achatz , J. Bosch , D. Rombach , T. Beauvais , A. Fuggetta , J.-P. Banatre , F. Bancilhon , S. De Panfilis , F. Bomarius , H. Saikkonen , H. Kuilder , G. Boeckle , B. Fitzgerald , and C. M. Olsson . The software and services challenge. Technical report, Technology Pillar on Software, Grids , Security and Dependability of the 7th Framework Programme , January 2006 . R. Achatz, J. Bosch, D. Rombach, T. Beauvais, A. Fuggetta, J.-P. Banatre, F. Bancilhon, S. De Panfilis, F. Bomarius, H. Saikkonen, H. Kuilder, G. Boeckle, B. Fitzgerald, and C. M. Olsson. The software and services challenge. Technical report, Technology Pillar on Software, Grids, Security and Dependability of the 7th Framework Programme, January 2006."},{"key":"e_1_2_1_2_1","volume-title":"Performance and Signal Processing","author":"ATIS","year":"2001","unstructured":"ATIS T1A1. Performance and Signal Processing . American National Standards Institute , ATIS Committee T1A1, 2001 . ATIS T1A1. Performance and Signal Processing. American National Standards Institute, ATIS Committee T1A1, 2001."},{"key":"e_1_2_1_3_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson R.","year":"2001","unstructured":"R. Anderson . Security Engineering: A Guide to Building Dependable Distributed Systems . Wiley Computer Publishing , 2001 . ISBN 0-471-38922-6. R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley Computer Publishing, 2001. ISBN 0-471-38922-6."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_5_1","first-page":"149","volume-title":"Proc. IEEE International Computer Software & Applications Conference (COMPSAC 77)","author":"Avizienis A.","year":"1977","unstructured":"A. Avizienis and L. Chen . On the implementation of n-version programming for software fault tolerance during execution . In Proc. IEEE International Computer Software & Applications Conference (COMPSAC 77) , pages 149 -- 155 , November 1977 . A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In Proc. IEEE International Computer Software & Applications Conference (COMPSAC 77), pages 149--155, November 1977."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04558-9","volume-title":"Systems and Software Verification - Model-Checking Techniques and Tools","author":"B\u00e9rard B.","year":"2001","unstructured":"B. B\u00e9rard , M. Bidoit , A. Finkel , F. Laroussinie , A. Petit . L. Petrucci , Ph. Schnoebelen Ph , and P. McKenzie . Systems and Software Verification - Model-Checking Techniques and Tools . Springer-Verlag , 2001 . ISBN 3-540-41523-8. B. B\u00e9rard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit. L. Petrucci, Ph. Schnoebelen Ph, and P. McKenzie. Systems and Software Verification - Model-Checking Techniques and Tools. Springer-Verlag, 2001. ISBN 3-540-41523-8."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039174.1039176"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1984.233702"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/8109.8113"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2000 USENIX Annual Technical Conference","author":"Aaron","year":"2000","unstructured":"Aaron B. Brown and David A. Patterson. Towards availability benchmarks: A case study of software raid systems . In Proceedings of the 2000 USENIX Annual Technical Conference , San Diego, CA, USA , June 2000 . Aaron B. Brown and David A. Patterson. Towards availability benchmarks: A case study of software raid systems. In Proceedings of the 2000 USENIX Annual Technical Conference, San Diego, CA, USA, June 2000."},{"key":"e_1_2_1_11_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. BSI Certification and BSI Product Information -- notes for manufacturers and vendors. http:\/\/www.bsi.bund.de\/zertifiz\/zert\/7138_e.pdf 2004. retrieved 3\/1\/2006.  Bundesamt f\u00fcr Sicherheit in der Informationstechnik. BSI Certification and BSI Product Information -- notes for manufacturers and vendors. http:\/\/www.bsi.bund.de\/zertifiz\/zert\/7138_e.pdf 2004. retrieved 3\/1\/2006."},{"key":"e_1_2_1_12_1","unstructured":"Bytepile. BytePile.com - Definition of QoS 2006. URL http:\/\/www.bytepile.com\/definitions-q.php.  Bytepile. BytePile.com - Definition of QoS 2006. URL http:\/\/www.bytepile.com\/definitions-q.php."},{"key":"e_1_2_1_13_1","volume-title":"UML Components: A Simple Process for Specifying Component-based Software (Component-based Development S.)","author":"Cheeseman John","year":"2000","unstructured":"John Cheeseman and John Daniels . UML Components: A Simple Process for Specifying Component-based Software (Component-based Development S.) . Addison Wesley , 2000 . John Cheeseman and John Daniels. UML Components: A Simple Process for Specifying Component-based Software (Component-based Development S.). Addison Wesley, 2000."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1980.234477"},{"key":"e_1_2_1_15_1","volume-title":"Distributed Systems: Concepts and Design. Pearson Education","author":"Coulouris George","year":"2001","unstructured":"George Coulouris , Jean Dollimore , and Tim Kindberg . Distributed Systems: Concepts and Design. Pearson Education , third edition, 2001 . George Coulouris, Jean Dollimore, and Tim Kindberg. Distributed Systems: Concepts and Design. Pearson Education, third edition, 2001."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971637"},{"key":"e_1_2_1_17_1","volume-title":"Lemos. ICSE 2003 WADS panel: Fault tolerance and self-healing","author":"Rogrio","year":"2003","unstructured":"Rogrio de Lemos. ICSE 2003 WADS panel: Fault tolerance and self-healing , 2003 . URL citeseer.ist.psu.edu\/656379.html. Rogrio de Lemos. ICSE 2003 WADS panel: Fault tolerance and self-healing, 2003. URL citeseer.ist.psu.edu\/656379.html."},{"key":"e_1_2_1_18_1","unstructured":"Department of Trade and Industry. Information technology security evaluation criteria. http:\/\/www.bsi.de\/zertifiz\/itkrit\/itsec-en.pdf 1991. retrieved 3\/1\/2006.  Department of Trade and Industry. Information technology security evaluation criteria. http:\/\/www.bsi.de\/zertifiz\/itkrit\/itsec-en.pdf 1991. retrieved 3\/1\/2006."},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Klaus Echtle. Fehlertoleranzverfahren. Springer-Verlag Berlin 1990.  Klaus Echtle. Fehlertoleranzverfahren. Springer-Verlag Berlin 1990.","DOI":"10.1007\/978-3-642-75765-5"},{"key":"e_1_2_1_21_1","first-page":"1","volume-title":"Approaches to Prototyping","author":"Floyd C.","year":"1984","unstructured":"C. Floyd . A systematic look at prototyping . In R. Budde, K. Kuhlenkamp, L. Mathiassen, and H. Z\u00fcllighoven, editors, Approaches to Prototyping , pages 1 -- 18 . Springer-Verlag , 1984 . C. Floyd. A systematic look at prototyping. In R. Budde, K. Kuhlenkamp, L. Mathiassen, and H. Z\u00fcllighoven, editors, Approaches to Prototyping, pages 1--18. Springer-Verlag, 1984."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/5\/4\/005"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293488"},{"key":"e_1_2_1_26_1","volume-title":"Dependability Engineering","author":"Hasselbring W.","year":"2006","unstructured":"W. Hasselbring and Simon Giesecke , editors. Dependability Engineering . Gito Verlag , Berlin, Germany , 2006 . ISBN 3-936771-56-1. W. Hasselbring and Simon Giesecke, editors. Dependability Engineering. Gito Verlag, Berlin, Germany, 2006. ISBN 3-936771-56-1."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.142"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789812389701_0013"},{"key":"e_1_2_1_29_1","volume-title":"IEEE","author":"IEEE","year":"1998","unstructured":"IEEE 1012--1998. IEEE 1012--1998 : Standard for Software Verification and Validation . IEEE , 1998 . Published standard. IEEE 1012--1998. IEEE 1012--1998: Standard for Software Verification and Validation. IEEE, 1998. Published standard."},{"key":"e_1_2_1_30_1","volume-title":"IEEE","author":"IEEE","year":"1990","unstructured":"IEEE 610.12:1990. IEEE 610.12:1990 : Standard Glossary of Software Engineering Terminology . IEEE , 1990 . Published standard. IEEE 610.12:1990. IEEE 610.12:1990: Standard Glossary of Software Engineering Terminology. IEEE, 1990. Published standard."},{"key":"e_1_2_1_31_1","volume-title":"SWEBOK: Guide to the Software Engineering Body of Knowledge","author":"IEEE","year":"2004","unstructured":"IEEE SWEBOK. SWEBOK: Guide to the Software Engineering Body of Knowledge . IEEE Computer Society Professional Practices Committee , Los Alamitos , California, 2004 . IEEE SWEBOK. SWEBOK: Guide to the Software Engineering Body of Knowledge. IEEE Computer Society Professional Practices Committee, Los Alamitos, California, 2004."},{"key":"e_1_2_1_32_1","volume-title":"ISO","author":"Quality Management ISO","year":"1994","unstructured":"ISO 8402. ISO 8402 Quality Management and Quality Assurance : Vocabulary . ISO , 1994 . Published standard. ISO 8402. ISO 8402 Quality Management and Quality Assurance: Vocabulary. ISO, 1994. Published standard."},{"key":"e_1_2_1_33_1","volume-title":"ISO\/IEC","author":"ISO","year":"2001","unstructured":"ISO 9126--3. Software engineering - Product quality - Part 3 : Internal Metrics . ISO\/IEC , June 2001 . Published standard. ISO 9126--3. Software engineering - Product quality - Part 3: Internal Metrics. ISO\/IEC, June 2001. Published standard."},{"key":"e_1_2_1_34_1","volume-title":"ISO\/IEC","author":"ISO","year":"2001","unstructured":"ISO 9126--1. Software engineering - Product quality - Part 1 : Quality model . ISO\/IEC , June 2001 . Published standard. ISO 9126--1. Software engineering - Product quality - Part 1: Quality model. ISO\/IEC, June 2001. Published standard."},{"key":"e_1_2_1_35_1","volume-title":"ISO\/IEC","author":"IEC","year":"1999","unstructured":"ISO\/ IEC 14598--1. ISO\/IEC 14598--1 : Information technology - Software product evaluation - Part 1: General overview . ISO\/IEC , 1999 . Published standard. ISO\/IEC 14598--1. ISO\/IEC 14598--1: Information technology - Software product evaluation - Part 1: General overview. ISO\/IEC, 1999. Published standard."},{"key":"e_1_2_1_36_1","volume-title":"ISO\/IEC","author":"IEC","year":"2001","unstructured":"ISO\/ IEC 9126--1. ISO\/IEC 9126--1 : Software Engineering - Product Quality - Part 1: Quality Model . ISO\/IEC , June 2001 . Published standard. ISO\/IEC 9126--1. ISO\/IEC 9126--1: Software Engineering - Product Quality - Part 1: Quality Model. ISO\/IEC, June 2001. Published standard."},{"key":"e_1_2_1_37_1","volume-title":"The Art of Computer Performance Analysis","author":"Jain Raj","year":"1991","unstructured":"Raj Jain . The Art of Computer Performance Analysis . John Wiley & Sons , 1991 . Raj Jain. The Art of Computer Performance Analysis. John Wiley & Sons, 1991."},{"key":"e_1_2_1_38_1","volume-title":"Fault tolerance in distributed systems","author":"Jalote Pankaj","year":"1994","unstructured":"Pankaj Jalote . Fault tolerance in distributed systems . Prentice-Hall , 1994 . Pankaj Jalote. Fault tolerance in distributed systems. Prentice-Hall, 1994."},{"key":"e_1_2_1_39_1","volume-title":"The Art of Computer Programming","author":"Knuth Donald E.","year":"1997","unstructured":"Donald E. Knuth . The Art of Computer Programming , Volume 1 , Fundamental Algorithms. Addison-Wesley , Reading, MA, USA, third edition, 1997 . ISBN 0-201-89683-4. Donald E. Knuth. The Art of Computer Programming, Volume 1, Fundamental Algorithms. Addison-Wesley, Reading, MA, USA, third edition, 1997. ISBN 0-201-89683-4."},{"key":"e_1_2_1_40_1","volume-title":"Workshop on Architecting Dependable Systems (WADS'03)","author":"Koopman P.","year":"2003","unstructured":"P. Koopman . Workshop on Architecting Dependable Systems (WADS'03) , May 2003 . URL www.ece.cmu.edu\/~koopman\/roses\/wads03\/wads03.pdf. P. Koopman. Workshop on Architecting Dependable Systems (WADS'03), May 2003. URL www.ece.cmu.edu\/~koopman\/roses\/wads03\/wads03.pdf."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_2_1_42_1","volume-title":"editor","author":"Laprie J. C.","year":"1998","unstructured":"J. C. Laprie , editor . Dependability : Basic Concepts and Terminology. Springer-Verlag , Wien, 1998 . J. C. Laprie, editor. Dependability: Basic Concepts and Terminology. Springer-Verlag, Wien, 1998."},{"key":"e_1_2_1_43_1","first-page":"27","volume-title":"Lyu {48}","author":"Laprie J.-C.","unstructured":"J.-C. Laprie and K. Kanoun . Software Reliability and System Reliability . In Lyu {48} , pages 27 -- 69 . J.-C. Laprie and K. Kanoun. Software Reliability and System Reliability. In Lyu {48}, pages 27--69."},{"key":"e_1_2_1_44_1","series-title":"Dependable Computing and Fault Tolerance","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7091-9170-5","volume-title":"Dependability: Basic Concepts and Terminology","author":"Laprie J. C. C.","year":"1992","unstructured":"J. C. C. Laprie , A. Avi\u017eienis , and H. Kopetz , editors . Dependability: Basic Concepts and Terminology , volume 5 of Dependable Computing and Fault Tolerance . Springer-Verlag , 1992 . ISBN 0387822968. J. C. C. Laprie, A. Avi\u017eienis, and H. Kopetz, editors. Dependability: Basic Concepts and Terminology, volume 5 of Dependable Computing and Fault Tolerance. Springer-Verlag, 1992. ISBN 0387822968."},{"key":"e_1_2_1_45_1","volume-title":"Quantitative System Performance - Computer System Analysis Using Queueing Network Models","author":"Lazowska E. D.","year":"1984","unstructured":"E. D. Lazowska , J. Zahorjan , G. S. Graham , and Sevcik K. C . Quantitative System Performance - Computer System Analysis Using Queueing Network Models . Prentice-Hall , 1984 . E. D. Lazowska, J. Zahorjan, G. S. Graham, and Sevcik K. C. Quantitative System Performance - Computer System Analysis Using Queueing Network Models. Prentice-Hall, 1984."},{"key":"e_1_2_1_46_1","volume-title":"Safeware: system safety and computers","author":"Leveson Nancy G.","year":"1995","unstructured":"Nancy G. Leveson . Safeware: system safety and computers . Addison-Wesley Publishing Company, Inc. , 1995 . ISBN 0-201-11972-2. Nancy G. Leveson. Safeware: system safety and computers. Addison-Wesley Publishing Company, Inc., 1995. ISBN 0-201-11972-2."},{"key":"e_1_2_1_47_1","first-page":"30","volume-title":"Inc.","author":"Lowrance William W.","year":"1976","unstructured":"William W. Lowrance . Of acceptable risk: science and the determination of safety. William Kaufman , Inc. , 1976 . ISBN 0-913232- 30 - 30 . William W. Lowrance. Of acceptable risk: science and the determination of safety. William Kaufman, Inc., 1976. ISBN 0-913232-30-0."},{"key":"e_1_2_1_48_1","volume-title":"Software Reliability Engineering","author":"Lyu Michael R.","year":"1996","unstructured":"Michael R. Lyu . Software Reliability Engineering . McGraw-Hill , New York , 1 edition, 1996 . Michael R. Lyu. Software Reliability Engineering. McGraw-Hill, New York, 1 edition, 1996."},{"key":"e_1_2_1_49_1","volume-title":"Performance by Design","author":"Menasce D. A.","year":"2004","unstructured":"D. A. Menasce , V. A. F. Almeida , and L. W. Dowdy . Performance by Design . Prentice Hall , 2004 . D. A. Menasce, V. A. F. Almeida, and L. W. Dowdy. Performance by Design. Prentice Hall, 2004."},{"key":"e_1_2_1_50_1","volume-title":"Object-Oriented Software Construction","author":"Meyer B.","year":"1997","unstructured":"B. Meyer . Object-Oriented Software Construction , Second Edition. The Object-Oriented Series. Prentice-Hall , Englewood Cliffs (NJ), USA, 1997 . B. Meyer. Object-Oriented Software Construction, Second Edition. The Object-Oriented Series. Prentice-Hall, Englewood Cliffs (NJ), USA, 1997."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/876900.881206"},{"key":"e_1_2_1_52_1","volume-title":"Prediction, Application","author":"Musa John D.","year":"1987","unstructured":"John D. Musa , Anthony Iannino , and Kazuhira Okumoto . Software Reliability: Measurement , Prediction, Application . McGraw-Hill , 1987 . ISBN 0-07-044093-X. John D. Musa, Anthony Iannino, and Kazuhira Okumoto. Software Reliability: Measurement, Prediction, Application. McGraw-Hill, 1987. ISBN 0-07-044093-X."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257788"},{"key":"e_1_2_1_54_1","volume-title":"Anonymity, unlinkability, unobservability, pseudonimity, and identity management - a consolidated proposal for terminology","author":"Pfitzmann A.","year":"2005","unstructured":"A. Pfitzmann and M. Hansen . Anonymity, unlinkability, unobservability, pseudonimity, and identity management - a consolidated proposal for terminology , 2005 . URL http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml. A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonimity, and identity management - a consolidated proposal for terminology, 2005. URL http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml."},{"key":"e_1_2_1_55_1","volume-title":"Security in Computing","author":"Pfleeger Charles P.","year":"1997","unstructured":"Charles P. Pfleeger . Security in Computing . Prentice-Hall, Inc. , Upper Saddle River, NJ, USA, 1997 . ISBN 0-13-337486-6. Charles P. Pfleeger. Security in Computing. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1997. ISBN 0-13-337486-6."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_2_1_57_1","first-page":"39","volume-title":"Research Methods in Software Engineering","author":"Rohr Matthias","year":"2006","unstructured":"Matthias Rohr . Example of empirical research: N-version programming . In W. Hasselbring and Simon Giesecke, editors, Research Methods in Software Engineering , pages 39 -- 62 . Gito Verlag, Berlin , Germany , 2006 . ISBN 3-936771-57-X. Matthias Rohr. Example of empirical research: N-version programming. In W. Hasselbring and Simon Giesecke, editors, Research Methods in Software Engineering, pages 39--62. Gito Verlag, Berlin, Germany, 2006. ISBN 3-936771-57-X."},{"key":"e_1_2_1_58_1","volume-title":"Trust in Cyberspace","author":"Schneider F. B.","year":"1998","unstructured":"F. B. Schneider , editor. Trust in Cyberspace . National Academy Press , Washington, DC , 1998 . F. B. Schneider, editor. Trust in Cyberspace. National Academy Press, Washington, DC, 1998."},{"key":"e_1_2_1_59_1","first-page":"0","author":"Schneier B.","year":"2003","unstructured":"B. Schneier . Beyond Fear . Springer-Verlag, Berlin , Germany , 2003 . ISBN 0 - 387 -02620-7. B. Schneier. Beyond Fear. Springer-Verlag, Berlin, Germany, 2003. ISBN 0-387-02620-7.","journal-title":"Germany"},{"key":"e_1_2_1_60_1","volume-title":"Scalable Software","author":"Smith Connie U.","year":"2002","unstructured":"Connie U. Smith and Lloyd G. Williams . Performance Solutions: A Practical Guide To Creating Responsive , Scalable Software . Addison-Wesley , 2002 . Connie U. Smith and Lloyd G. Williams. Performance Solutions: A Practical Guide To Creating Responsive, Scalable Software. Addison-Wesley, 2002."},{"key":"e_1_2_1_61_1","volume-title":"Software Engineering","author":"Sommerville Ian","year":"2004","unstructured":"Ian Sommerville . Software Engineering . Addison-Wesley , 7 th edition, 2004 . Ian Sommerville. Software Engineering. Addison-Wesley, 7th edition, 2004.","edition":"7"},{"key":"e_1_2_1_62_1","volume-title":"Safety Critical Computer Systems","author":"Storey Neil R.","year":"1996","unstructured":"Neil R. Storey . Safety Critical Computer Systems . Addison-Wesley Longman Publishing Co., Inc. , 1996 . ISBN 0-201-42787-7. Neil R. Storey. Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., 1996. ISBN 0-201-42787-7."},{"key":"e_1_2_1_63_1","volume-title":"Component Software: Beyond Object-Oriented Programming","author":"Szyperski Clemens","year":"2002","unstructured":"Clemens Szyperski , Dominik Gruntz , and Stephan Murer . Component Software: Beyond Object-Oriented Programming . ACM Press and Addison-Wesley , New York, NY , 2 nd edition, 2002 . Clemens Szyperski, Dominik Gruntz, and Stephan Murer. Component Software: Beyond Object-Oriented Programming. ACM Press and Addison-Wesley, New York, NY, 2nd edition, 2002.","edition":"2"},{"key":"e_1_2_1_64_1","volume-title":"Tanenbaum and Maarten Van Steen. Distributed Systems: Principles and Paradigms","author":"Andrew","year":"2001","unstructured":"Andrew S. Tanenbaum and Maarten Van Steen. Distributed Systems: Principles and Paradigms . Prentice Hall , 2001 . ISBN 0130888931. Andrew S. Tanenbaum and Maarten Van Steen. Distributed Systems: Principles and Paradigms. Prentice Hall, 2001. ISBN 0130888931."},{"key":"e_1_2_1_65_1","volume-title":"Probability and Statistics with Reliability, Queuing and Computer Science Applications","author":"Trivedi K. S.","year":"1982","unstructured":"K. S. Trivedi . Probability and Statistics with Reliability, Queuing and Computer Science Applications . Prentice Hall , 1982 . ISBN 0-13-711564-4. K. S. Trivedi. Probability and Statistics with Reliability, Queuing and Computer Science Applications. Prentice Hall, 1982. ISBN 0-13-711564-4."},{"key":"e_1_2_1_66_1","volume-title":"Probability and Statistics with Reliability, Queuing and Computer Science Applications","author":"Trivedi Kishor S.","year":"2001","unstructured":"Kishor S. Trivedi . Probability and Statistics with Reliability, Queuing and Computer Science Applications . John Wiley and Sons , 2 nd edition, 2001 . ISBN 0-471-33341-7. Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing and Computer Science Applications. John Wiley and Sons, 2nd edition, 2001. ISBN 0-471-33341-7.","edition":"2"},{"key":"e_1_2_1_67_1","volume-title":"Electronic Reliability Design Handbook","author":"US Department of Defense.","year":"1998","unstructured":"US Department of Defense. Electronic Reliability Design Handbook , 1998 . URL http:\/\/www.barringer1.com\/mil_files\/MIL-HDBK-338.pdf. US Department of Defense. Electronic Reliability Design Handbook, 1998. URL http:\/\/www.barringer1.com\/mil_files\/MIL-HDBK-338.pdf."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1218776.1218781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1218776.1218781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:41Z","timestamp":1750278161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1218776.1218781"}},"subtitle":["a discussion of basic concepts and terminology"],"short-title":[],"issued":{"date-parts":[[2006,11]]},"references-count":64,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,11]]}},"alternative-id":["10.1145\/1218776.1218781"],"URL":"https:\/\/doi.org\/10.1145\/1218776.1218781","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2006,11]]},"assertion":[{"value":"2006-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}