{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:40:21Z","timestamp":1651862421318},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>The development and evolution of trusted software is the focus of attention in the fields of trusted software and software engineering at home and abroad. In view of its complexity and diversity, this article proceeds with component, which is the basic element of software architecture, and discusses the refinement of trusted component. Refine one of the operations and its local environment using OR-transition colored Petri net to achieve the purpose of gradual refinement.<\/p>","DOI":"10.4018\/ijisscm.2018010103","type":"journal-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T14:44:15Z","timestamp":1511880255000},"page":"31-38","source":"Crossref","is-referenced-by-count":1,"title":["Operation Refinement in Trusted Component Based on OR-Transition Colored Petri Net"],"prefix":"10.4018","volume":"11","author":[{"given":"Na","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Software, Yunnan University, Kunming, China"}]},{"given":"Jin","family":"Xu","sequence":"additional","affiliation":[{"name":"Yunnan University, Kunming, China"}]},{"given":"Xiucheng","family":"Yang","sequence":"additional","affiliation":[{"name":"ICube Laboratory, University of Strasbourg, Strasbourg, France"}]},{"given":"Zhongwen","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Software, Yunnan University, Kunming, China"}]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Software, Yunnan University, Kunming, China"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Kunming University of Science and Technology, Kunming, China"}]}],"member":"2432","reference":[{"key":"IJISSCM.2018010103-0","doi-asserted-by":"publisher","DOI":"10.4018\/jisscm.2009062903"},{"key":"IJISSCM.2018010103-1","author":"J. T.Chargo","year":"2013","journal-title":"Automated Software Architecture Extraction Using Graph-based Clustering. Graduate Theses and Dissertations"},{"key":"IJISSCM.2018010103-2","first-page":"1933","article-title":"High Confidence Software Engineering Technologies.","volume":"31","author":"H. W.Chen","year":"2003","journal-title":"Tien Tzu Hsueh Pao"},{"issue":"3","key":"IJISSCM.2018010103-3","first-page":"977","article-title":"New system based on event-driven and service-oriented business activity monitoring design and implementation.","volume":"29","author":"X. D.Chen","year":"2012","journal-title":"Jisuanji Yingyong Yanjiu"},{"key":"IJISSCM.2018010103-4","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03813"},{"key":"IJISSCM.2018010103-5","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2013.16"},{"key":"IJISSCM.2018010103-6","doi-asserted-by":"crossref","unstructured":"Hall, A. (2002). Correctness by Construction: Integrating Formality into a Commercial Development Process. In FME 2002: Formal Methods \u2013 Getting IT Right, LNCS (Vol. 2391, pp. 224-233). Springer Verlag.","DOI":"10.1007\/3-540-45614-7_13"},{"key":"IJISSCM.2018010103-7","doi-asserted-by":"publisher","DOI":"10.1109\/52.976937"},{"key":"IJISSCM.2018010103-8","first-page":"20","article-title":"Software Evolution Based on Service-Oriented Requirement in Internetware.","author":"Y. H.Jia","year":"2012","journal-title":"4th International Conference on Computer Research and Development"},{"key":"IJISSCM.2018010103-9","doi-asserted-by":"publisher","DOI":"10.4018\/jisscm.2011010101"},{"key":"IJISSCM.2018010103-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31656-2_78"},{"key":"IJISSCM.2018010103-11","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.4"},{"key":"IJISSCM.2018010103-12","doi-asserted-by":"publisher","DOI":"10.5120\/12460-8814"},{"key":"IJISSCM.2018010103-13","unstructured":"Rathod, H., & Parmar, M. (2012). Study of Genetic Approach in Estimating Reliability of Component Based Software. PARIPEX - Indian Journal of Research, 1(11), 17-19."},{"key":"IJISSCM.2018010103-14"},{"key":"IJISSCM.2018010103-15","unstructured":"Secure Software, Inc. (2005). The CLASP Application Security Process. http:\/\/www.ida.liu.se\/~TDDC90\/papers\/clasp_external.pdf"},{"key":"IJISSCM.2018010103-16","doi-asserted-by":"publisher","DOI":"10.4018\/IJISSCM.2016010101"},{"key":"IJISSCM.2018010103-17","doi-asserted-by":"publisher","DOI":"10.5120\/7711-1107"},{"key":"IJISSCM.2018010103-18","doi-asserted-by":"publisher","DOI":"10.1007\/s11430-006-1156-0"},{"key":"IJISSCM.2018010103-19","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.7.8.1744-1750"},{"key":"IJISSCM.2018010103-20","doi-asserted-by":"crossref","unstructured":"Wehrmeister, M. A., Freitas, E. P., Pereira, C. E., & Wagner, F. R. (2007). An Aspect-Oriented Approach for Dealing with Non-Functional Requirements in a Model-Driven Development of Distributed Embedded Real-Time Systems. In Proceedings of 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC '07) (pp. 428-432).","DOI":"10.1109\/ISORC.2007.17"},{"issue":"1","key":"IJISSCM.2018010103-21","first-page":"41","article-title":"Software Evolution for Moving into and Moving within Internetware Paradigm.","volume":"7","author":"H. J.Yang","year":"2013","journal-title":"International Journal of Software and Informatics"},{"key":"IJISSCM.2018010103-22","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, Q., & Li, M. (2009). Process trustworthiness as a capability indicator for measuring and improving software trustworthiness. In Proceedings of International Conference on Software Process (ICSP\u201909), Vancouver, Canada (pp. 389-401). Springer.","DOI":"10.1007\/978-3-642-01680-6_35"},{"key":"IJISSCM.2018010103-23","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2009.23"},{"key":"IJISSCM.2018010103-24","doi-asserted-by":"publisher","DOI":"10.4018\/jisscm.2009070102"}],"container-title":["International Journal of Information Systems and Supply Chain Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=193662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:24:28Z","timestamp":1651861468000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISSCM.2018010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisscm.2018010103","relation":{},"ISSN":["1935-5726","1935-5734"],"issn-type":[{"value":"1935-5726","type":"print"},{"value":"1935-5734","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}