{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T16:38:57Z","timestamp":1649003937845},"reference-count":22,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.12.2771-2778","type":"journal-article","created":{"date-parts":[[2012,12,28]],"date-time":"2012-12-28T21:06:02Z","timestamp":1356728762000},"source":"Crossref","is-referenced-by-count":0,"title":["Trusted Software Constitution Model Based on Trust Engine"],"prefix":"10.17706","volume":"7","author":[{"given":"Junfeng","family":"Tian","sequence":"first","affiliation":[]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jianlei","family":"Feng","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,12,1]]},"reference":[{"issue":"no. 12A","key":"ref1","first-page":"1933","article-title":"High Confidence Software Engineering Technologies","volume":"31","author":"Huowang","year":"2003","unstructured":"[1] Chen Huowang, Wang Ji, Dong Wei, \"High Confidence Software Engineering Technologies,\" Acta Electronica Sinica, vol. 31, no. 12A, pp. 1933\u20131937, 2003.","journal-title":"Acta Electronica Sinica"},{"issue":"no. 12","key":"ref2","first-page":"4585","article-title":"Research and implementation of trusted software constitution based on monitoring","volume":"26","author":"Renjie","year":"2009","unstructured":"[2] Li Renjie, Zhang Zhuxi, Jiang Haiyan, Wang Huaimin, \"Research and implementation of trusted software constitution based on monitoring,\" Application Research of Computers, vol. 26, no. 12, pp. 4585\u20134588, Dec. 2009.","journal-title":"Application Research of Computers"},{"issue":"no. 13","key":"ref3","first-page":"1214","article-title":"Software techniques evolved by the Internet: Current situation and future trend","volume":"55","author":"Hong","year":"2010","unstructured":"[3] Mei Hong, Liu Xizhe, \"Software techniques evolved by the Internet: Current situation and future trend,\" Chinese Sci Bull, vol. 55, no. 13, pp. 1214\u20131220, 2010.","journal-title":"Chin Sci Bull","ISSN":"http:\/\/id.crossref.org\/issn\/1001-6538","issn-type":"print"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/242223.242257"},{"key":"ref5","volume-title":"Cleanroom Software Engineering Technology and Process","author":"Prowell","year":"1999","unstructured":"[5] S. J. Prowell, C. J. Trammell, R. C. Linger, J. H. Poore, Cleanroom Software Engineering: Technology and Process, Boston: Addison-Wesley Professional, 1999."},{"issue":"no. 12A","key":"ref6","first-page":"1907","article-title":"Model Checking: Theories, Techniques and Applications","volume":"30","author":"Huimin","year":"2002","unstructured":"[8] Liu Huimin, Zhang Wenhui, \"Model Checking: Theories, Techniques and Applications,\" Chinese Journal of Electronics, vol. 30, no. 12A, pp. 1907\u20131912, Dec. 2002.","journal-title":"Chinese Journal of Electronics"},{"issue":"no. 6","key":"ref7","first-page":"1141","article-title":"A strategy for model construction and integration in MDA","volume":"17","author":"Jing","year":"2006","unstructured":"[10] Liu Jing, He Jifeng, Miao Huaikou, \"A strategy for model construction and integration in MDA,\" Journal of Software, vol. 17, no. 6, pp. 1141\u20131422, Jun. 2006.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref8","first-page":"310","article-title":"Research to a dynamic application transitive trust model","volume":"33","author":"Xiaoyong","year":"2005","unstructured":"[11] Li Xiaoyong, Shen Changxiang, \"Research to a dynamic application transitive trust model,\" J.Huazhong Univ. of Sci. & Tech (Nature Science Edition), vol. 33, pp. 310\u2013312, Dec. 2005.","journal-title":"J Huazhong Univ of Sci & Tech"},{"issue":"no. 3","key":"ref9","first-page":"315","article-title":"Agents: Present Status and Trends","volume":"11","author":"Dayou","year":"2000","unstructured":"[12] Liu Dayou, Yang Kun, Chen Jianzhong, \"Agents: Present Status and Trends,\" Journal of Software, vol. 11, no. 3, pp. 315\u2013321, Nov. 2000.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref10","volume-title":"Kent Yoder Ryan Catherman A Practical Guide to Trusted Computing","author":"Challener","year":"2009","unstructured":"[13] David Challener, Kent Yoder, Ryan Catherman, A Practical Guide to Trusted Computing, Upper Saddle River, NJ: IBM Press, 2009."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0069-x"},{"issue":"no. 8","key":"ref12","first-page":"1134","article-title":"Research of System Call Based Intrusion Detection","volume":"31","author":"Lihong","year":"2003","unstructured":"[16] Yao Lihong, Zi Xiaochao, Huang Hao, Mao Bing, Xie Li, \"Research of System Call Based Intrusion Detection,\" Acta Electronica Sinica, vol. 31, no. 8, pp. 1134\u20131137, Aug. 2003.","journal-title":"Acta Electronica Sinica"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref14","first-page":"29","article-title":"Improving Design Pattern Instance Recognition by Dynamic Analysis","volume-title":"Proc of the ICSE 2003 Workshop on Dynamic Analysis (WODA)","author":"Wendehals","year":"2003","unstructured":"[19] L. Wendehals, \"Improving Design Pattern Instance Recognition by Dynamic Analysis,\" In Proc. of the ICSE 2003 Workshop on Dynamic Analysis (WODA), pp. 29\u201332, May 2003."},{"issue":"no. 5","key":"ref15","first-page":"606","article-title":"From Petri Nets to Formal Description Techniques and Protocol Engineering","volume":"11","author":"Junzhou","year":"2000","unstructured":"[20] Luo Junzhou, Shen Jun, Gu Guanqun, \"From Petri Nets to Formal Description Techniques and Protocol Engineering,\" Journal of Software, vol. 11, no. 5, pp. 606\u2013615, Nov. 2000.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44755-5_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[6] VO Safonov, Using aspect-oriented programming for trustworthy software development, Wiley Interscience, Jun. 2008.","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[7] Qu Yanwen, Software Behavior, Beijing: Electronic Industry Press, Oct. 2004.","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[9] Wang Huaimin, Liu Xudong, Xie Bing, Software Trustworthiness Classification Specification, TRUSTIE-STC V2.0, May 2009.","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[15] Trusted Computing Group, TCG Specification Architecture Overview, Https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_0_Architecture_Overview.pdf.","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[18] M. Christodorescu, S. Jha, \"Static analysis of executables to detect malicious patterns,\" In Proceedings of the 12th USENIX Security Symposium (Security'03), pp. 169\u2013186, Aug. 2003.","DOI":"10.3724\/SP.J.1001.2010.03782"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:58:16Z","timestamp":1498021096000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/8872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,1]]},"references-count":22,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2012,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.12.2771-2778","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,12,1]]}}}