期刊文献+

软件能力可信研究综述 被引量:3

Survey on Trustworthy Capability of Software
下载PDF
导出
摘要 能力可信是可信计算研究领域中的重要研究内容,它要求系统的功能是可信赖的.如今,系统的开发方式、系统规模、应用模式已发生巨大变化,这使得获得功能的可信赖性的任务更具挑战性.首先综述能力可信的概念、内涵等,详细介绍了能力可信的性能指标.从缺陷分析、可靠性模型、恢复技术三个方面讨论了能力可信的研究现状、和存在问题,最后对能力可信的未来发展趋势进行了探讨. Trustworthy capability is one of the important targets of Trusted computing. Trustworthy capability requires the system' s capability should be reliable. Nowadays, great changes have happened to the method of developing software, system' s scale and application mode, which cause the task of attaining system' s trustworthy capability more challenging. A survey on trustworthy Capability is presented in this paper, including the definition, the range. Furthermore, the current state and the existing issues of the trustworthy capability of software are discussed in terms of the faults analysis, dependability models and recovery technologies. Lastly the trend of trustworthy capability of software is pointed out.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第5期785-792,共8页 Journal of Chinese Computer Systems
基金 国家"十一五"国防预研项目(06004089)资助
关键词 能力可信 可靠性模型 缺陷分析 ROC trustworthy capability dependability models faults analysis ROC
  • 相关文献

参考文献58

  • 1Anderson J, Computer security technology planning study[M]. ESD-TR-73-51, volumes Ⅰ and Ⅱ, USAF Electronic Systems Div. , Beford Mass. Oct. 1972.
  • 2NSF. CISE-trusted computing [EB/OL]. http://www. nsf. gov, 2006-04-21.
  • 3Information technology-security techniques-evaluation criteria for IT security [DB/OL]. http ://standards. iso. org/ittf/PublielyAvail-ableStandards/c040612_ ISO_IEC_ 15408-1_2005 (E). zip, 2006/4/14.
  • 4Gates B. Trustworthy computing [DB/OL ]. http://www. wired. com/news/business/0, 1367, 49826, 00. html, 2006/3/ 15.
  • 5Wang Hui-ming, Tang Yang-bin, Yin Gang, et al. Trustworthy theory of internet software[J]. Science In China Ser. E Information Sciences, 2006,36(10) :1156-1169.
  • 6Algirdas A, Jean-Claude L, Brian R, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(1): 11-33.
  • 7Michael R Lyu. Handbook of software reliability engineering [M]. IEEE Computer Society Press, 1996.
  • 8Zou Feng-xing, Zhang Xiang-ping. The foundation of the fault diagnosis and reliability technology for computer application system[M]. Beijing, Higher Education Press, 1999.
  • 9蒋乐天,徐国治.软件缺陷及软件可靠性技术[J].计算机仿真,2004,21(2):141-144. 被引量:16
  • 10Gray J N. Why do computers stop and what can be done about it [C]. Proc. Fifth Symp. Reliability in Distributed Software and Database Systems, Los Anydes Marriott, Jan. 1986, 3-12.

二级参考文献52

  • 1陈学军,苏振华.软件可靠性模型研究[J].电子产品可靠性与环境试验,1996,14(5):17-24. 被引量:2
  • 2徐仁 郑人杰 等.软件可靠性模型及应用[M].清华大学出版社,广西科学技术出版社,1994..
  • 3王戟.可靠性增长建模工具CaSoR[M].国防科学技术大学,2001..
  • 4刘增强 刘有才.模糊逻辑与神经网络[M].北京航空航天大学出版社,1996.217-218.
  • 5刘增强 刘有才.模糊逻辑与神经网络[M].北京航空航天大学出版社,1996.217-218.
  • 6.[EB/OL].http://software.ccidnet.com/pub/disp/ArticlecolumnlD=375articlelD=25560pageNO=1.2002.,.
  • 7K Y Cai,C Y Wen,M L Zhang.A critical review on software reliability modeling[J].Reliability engineering and system safety,1991 ;32 (3) :357-371.
  • 8Xuemei Zhang,Hoang Pham.An analysis of factors affecting software reliability[J].The journal of systems and software,2000;50:43-56.
  • 9Andrew R Gray,Stephen G MacDonell.Fuzzy Logic for Software Metric Models throughout the Development Life-Cycle[C];In: 18th International Conference of the North American Fuzzy Information Procecsing Society-Natlps,New York,USA,1999:258-262.
  • 10Karuanithi N.A neural network approach for software reliability growth modeling in the presence of code churn[C].In:Proceedings of the Fourth International Symposium on Software Reliability Engineering,1993: 310-317.

共引文献81

同被引文献42

  • 1侯智,陈世平.基于Kano模型的用户需求重要度调整方法研究[J].计算机集成制造系统,2005,11(12):1785-1789. 被引量:80
  • 2魏丽坤.Kano模型和服务质量差距模型的比较研究[J].世界标准化与质量管理,2006(9):10-13. 被引量:59
  • 3郭树行,兰雨晴,金茂忠.软件构件的可信保证研究[J].计算机科学,2007,34(5):243-246. 被引量:14
  • 4ISO/IEC 15408-3:2005,Information technology:security techniques:evaluation criteria for IT security,part 1:introduction and general model[S].2005.
  • 5AMOROSO E C,TAYLOR J,WATSON J,et al.A process-oriented methodology for assessing and improving software trustworthiness[C] //Proc of the 2nd ACM Conference on Computer and Communications Security.New York:ACM,1994:39-50.
  • 6GARCIA A F,RUBIRA M F,ROMANOVSKY A,et al.A comparative study of exception handling mechanisms for building dependable object-oriented software[J].Journal of Systems and Software,2001,59(2):197-222.
  • 7INVERARDI P,TIVOLI M.The future of software:adaptation and dependability[C] //Lecture Notes in Computer Science,Software Engineering:International Summer Schools,Revised Tutorial Lectures.Berlin:Springer,2009:1-31.
  • 8IMMONEN A,PALYIAINEN M.Trustworthiness evaluation and testing of open source components[C] //Proc of the 7th International Conference on Quality Software.Washington DC:IEEE Computer Society,2007:11-12.
  • 9AKAO Y.Quality function deployment:integrating customer requirements into product design[M].[S.l.] :Productivity Press,1990.
  • 10WILLIAM H.Integrated analytic hierarchy process and its applications:a literature review[J].European Journal of Operational Research,2008,186(1):211-228.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部