4Immornen A,Palyiainen M.Trustworthiness evaluation and testing of open source components[C].Proc of the 7th Int Conf on Quality Software.Washington DC:IEEE Computer Society,2007:11-12.
5ISO/IEC 15408-3:2005,Information technology:security techniques:evaluation criteria for IT security,part 1:introduction and general model[S].2005.
6Shi,H1L,Ma,J1 Zou,F1 Y.Software dependability evaluation model based on fuzzy theory[C].In International Conference on Computer Science and Information Technology,2008:102-106.
7Gottesdiener.E.Requirements by Collaboration.Boston:Addison-Wesley[M].2002.
8Robinson,W.N.,Volkov,V.Supporting the negotiation life cycle[J].Communications of the ACM,1998,41(5):95-102.
9Navarro,E,Modioli,J.A.,Letelier,P.,and Ramos,I.A meta modeling approach for requirements specification[J].Journal of Computer Information Systems,2006(Special Issue):67-77.