[1] 刘克,单志广,王戟,等."可信软件基础研究"重大研究计划综述[M].北京:中国科学基金,2008.145-151.
[2] Department of Defense.Department of defense trusted computer system evaluation criteria[S].Department of Defense 5200.28-STD,1985.
[3] 汤永新,刘增良.软件可信性度量模型研究进展[J].计算机工程与应用,2010,46(27):12-16.
[4] Sagasti F R,Mitroff I I.Operations research from the viewpoint of general systems theory[J].OMEGA,1973,1(6):695-709.
[5] Singleton R,Jr Straits B C,Straits M M,et al.Approaches to Social Research[M].New York:Oxford University Press,1988.
[6] ISO/IEC 14598-1.Information technology-software product evaluation-Part 1:General overview[S].ISO/IEC,1999.
[7] Rousseau D M,Sitkin S B,Burt R S,et al.Not so different after all:A cross-discipline view of trust[J].The Academy of Management Review,1998,23(3):1-12.
[8] Schoorman F D,Mayer R C,Davis J H.An integrative model of organizational trust:Past,present,and future[J].The Academy of Management Review,2007,32(2):344-354.
[9] Mcknight D H,Chervany N L.What trust means in e-commerce customer relationships:An interdisciplinary conceptual typology[J].International Journal of Electronic Commerce,2001,6(2):35-59.
[10] Mcknight D H,Carter M,Thatcher J B,et al.Trust in a specific technology:An investigation of its components and measures[J].ACM Transactions on Management Information System,2011,2(2):1-25.
[11] Kee H W,Knox R E.Conceptual and methodological considerations in the study of trust and Suspicion[J].The Journal of Conflict Resolution,1970,14(3):357-366.
[12] Lewicki R J,Bunker B B.Developing and maintaining trust in work relationships[J].In Trust in Organizations:Frontiers of Theory and Research,1996:114-139.
[13] Coleman J S.Foundations of Social Theory[M].Cambridge,MA:Harvard University Press,1990.
[14] Colquitt J A,Brent S A,LePine J A.Trust,trustworthiness,and trust propensity:A meta-analytic test of their unique relationships with risk taking and job performance[J].Journal of Applied Psychology,2007,92(4):909-927.
[15] ISO/IEC FDIS 9126-1:2001.Information technology-Software product quality-Part 1:Quality Model[S].ISO/IEC,2001.
[16] ISO/IEC 2382-14:1997.Information technology-Vocabulary-Part 14:Reliability,maintainability and availability[S].ISO/IEC,1997.
[17] IEEE 610.12:1990.Standard glossary of software engineering terminology[S].IEEE,1990.
[18] Becker S,et al.Trustworthy software systems:a discussion of basic concepts and terminology[J].ACM Sigsoft Software Engineering Notes,2006,31(6):1-18.
[19] 王克,邹嘉,戴一奇.基于软件实名认证的系统安全机制[J].清华大学学报(自然科学版),2008,(07):1169-1172.
[20] Yang X,Jabeen G,Luo P,et al.A unified measurement solution of software trustworthiness based on social-to-software framework[J].Journal of Computer Science And Technology,2018,33(3):603-620. |