期刊文献+

可信软件研究 被引量:3

Study on Trusted Software
下载PDF
导出
摘要 可信软件是近年来软件工程领域研究的热点,装备软件可信性的研究有助于提升我国国防武器装备的作战效能。首先分析了进行装备软件可信相关研究的必要性;然后阐述可信软件技术的研究现状,主要包括软件可信度量和评估、可信软件的构造与验证、可信软件的演化与控制等三个方面;最后分析了研究可信装备软件面临的挑战。 Trusted software has become a hotspot of the software engineering area in recent years, and it helps to enhance our weapon efficiency to study the trusted arming software. Firstly this paper analyzes the necessity of trusted arming software ; and then it summarizes the research state of trusted software technique, which include the following aspects : measure- ment and evaluation of software creditability, construction and validation of trusted software, evolvement and control of trus ted software; lastly analyzes the challenges facing in the trusted arming software.
出处 《指挥控制与仿真》 2013年第4期8-11,31,共5页 Command Control & Simulation
基金 总装备部"十二五"基金项目
关键词 可信软件 可信度量与评估 可信构造与验证 可信演化与控制 trusted software measurement and evaluation of software creditability construction and validation of trusted software evolvement and control of trusted software
  • 相关文献

参考文献23

  • 1网络与信息技术研究发展计划(NITRD).http://www.nitrd.gov.
  • 2TURST. http ://www. truststc, org/.
  • 3刘克,单志广,王戟,何积丰,张兆田,秦玉文.“可信软件基础研究”重大研究计划综述[J].中国科学基金,2008,22(3):145-151. 被引量:137
  • 4WANG Huai min, LIU Xu dong. etc. Software trustworthiness classification specification (TRUSTIE STCV2. 0 ) [EB/OL] ,2009.
  • 5T. Anderson, A. Avizienis, W. Carter, et al. Dependability : basic concepts and terminology [ J ]. Series : Dependable Computing and Fault-Tolerant Systems, 1994, 5.
  • 6Trustie Group. A trustworthy software production environment for large scale software resource sharing and cooperative development [ EB/OL ]. 2008: http: //www. trustie, org.
  • 7J.B. Yang, Y.M. Wang, D.L. Xu, et al. The evidential reasoning approach for MADA under both probabilistic and fuzzy uncertainties [ J ]. European Journal of Operational Research, 2006, 171( 1): 309-343.
  • 8J.B. Yang, J. Liu, J. Wang, et al. Belief rule-base in- ference methodology using the evidential reasoning approach-RIMER[J]. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 2006, 36 (2) : 266-285.
  • 9姚爽,郭亚军,黄玮强.基于证据距离的改进DS/AHP多属性群决策方法[J].控制与决策,2010,25(6):894-898. 被引量:21
  • 10OMG MDA Guide Version 1.0. 1. http://www, omg. org/ cgi-bin/doc? omg/03-06-01,retrieved at 2009.

二级参考文献52

共引文献240

同被引文献24

  • 1郭树行,兰雨晴,金茂忠.软件构件的可信保证研究[J].计算机科学,2007,34(5):243-246. 被引量:14
  • 2肖曦,韩军,汪伦伟.可信计算平台关键机制研究[J].信息工程大学学报,2007,8(2):217-220. 被引量:5
  • 3张焕国 何炎祥 赵波.我国可信计算研究与发展.中国计算机学会通讯,2010,6(2):8-18.
  • 4黄玉坤.软件复用技术及领域工程综述[J].计算机与现代化,2007(11):43-45. 被引量:4
  • 5Councill B,Heineman G T.Component-based software engineering and the issue of trust [C]// Proceedings of the 22nd International Conference on Software Engineering.2000:661-664.
  • 6Si Guangnan,Xu Jing,Yang Jufeng,et all.An evaluation model for dependability of internet-scale software on basis of Bayesian networks and trustworthiness [J].Journal of Systems and Software,2014,89:63-75.
  • 7Srivastava P R,Kumar K.An approach towards software quality assessment[J].Information Systems,Technology and Management,2009,31:150-160.
  • 8Marshall D Abrams,Michael V Joyce.Trusted computing update[J].Computers & Security,1995,14(1):57-68.
  • 9WANG Huai min, LIU Xu worthiness classification dong. etc. Software trust specification ( TRUSTIE STCV2.0) [EB/OL] ,2009.
  • 10National Science Technology Council. America in the Age of Information: A forum on Federal Information and Communications R&D[R]. Bethesda,Maryland, 1995.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部