Trust Model of Software Behaviors Based on Check Point Risk Evaluation
暂无分享,去创建一个
[1] Wang Yue-sheng. Model of fuzzy risk assessment of the information system , 2007 .
[2] Svein J. Knapskog,et al. Belief-Based Risk Analysis , 2004, ACSW.
[3] Wang Ji,et al. High Confidence Software Engineering Technologies , 2003 .
[4] Thomas L. Saaty. What is the analytic hierarchy process , 1988 .
[5] Jun Li,et al. Monitoring and characterization of component-based systems with global causality capture , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[6] Marten van Sinderen,et al. Monitoring of Distributed Component Interactions , 2000 .
[7] Robert A. Olsen. Trust as risk and the foundation of investment value , 2008 .
[8] Grigore Rosu,et al. Mop: an efficient and generic runtime verification framework , 2007, OOPSLA.
[9] P. Ring,et al. Developmental Processes of Cooperative Interorganizational Relationships , 1994 .
[10] Audun Jøsang,et al. Analysing the Relationship between Risk and Trust , 2004, iTrust.
[11] Yang Shanlin,et al. Comparative Study on Several Scales in AHP , 2004 .
[12] J. H. Davis,et al. An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .
[13] S Hailes,et al. Using Recommendations for Managing Trust in Distributed Systems , 1997 .
[14] Zhang Run. A Trust Model Based on Behaviors Risk Evaluation , 2009 .
[15] Jiawei Han,et al. Classification of software behaviors for failure detection: a discriminative pattern mining approach , 2009, KDD.
[16] Leonardo Mariani,et al. A Technique for Verifying Component-Based Software , 2005, Electron. Notes Theor. Comput. Sci..
[17] Tang Yang-bin,et al. Trustworthiness of Internet-based software , 2006 .