共 58 条
[1]
Liu K., Shan Z.G., Wang J., He J.F., Zhang Z.T., Qin Y.W., Overview on major research plan of trustworthy software, Science Foundation of China, 22, 3, pp. 145-151, (2008)
[2]
Wang H.M., Liu X.D., Lang B., Xie B., Mao X.G., Software trustworthiness classification specification (TRUSTIE-STC v2.0), Technical Report, (2009)
[3]
Amoroso E., Taylor C., Watson J., Weiss J., A process-oriented methodology for assessing and improving software trustworthiness, Proc. of the ACM Conf. on Computer and Communications Security (CCS), pp. 39-50, (1994)
[4]
Jin Z., Liu L., Jin Y., Software Requirements Engineering: Principles and Methods, (2008)
[5]
Boehm B., In H., Identifying quality-requirement conflicts, Software, 13, 2, pp. 25-35, (1996)
[6]
Tao H.W., Research on the measurement models of software trustworthiness based on attributes, (2011)
[7]
Moser T., Winkler D., Heindl M., Biffl S., Requirements management with semantic technology: An empirical study on automated requirements categorization and conflict analysis, Proc. of the Advanced Information Systems Engineering, pp. 3-17, (2011)
[8]
Mairiza D., Zowghi D., Constructing a catalogue of conflicts among non-functional requirements, Proc. of the Evaluation of Novel Approaches to Software Engineering, Communications in Computer and Information Science, 230, pp. 31-44, (2011)
[9]
Boehm B., Bose P., Horowitz E., Lee M., Software requirements as negotiated win conditions, Proc. of the ICRE'94, pp. 74-83, (1994)
[10]
Boehm B., Bose P., Horowitz E., Lee M., Software requirements negotiation and renegotiation aids: A theory-W based spiral approach, Proc. of the ICSE'95, (1995)