共 58 条
- [1] Liu K., Shan Z.G., Wang J., He J.F., Zhang Z.T., Qin Y.W., Overview on major research plan of trustworthy software, Science Foundation of China, 22, 3, pp. 145-151, (2008)
- [2] Wang H.M., Liu X.D., Lang B., Xie B., Mao X.G., Software trustworthiness classification specification (TRUSTIE-STC v2.0), Technical Report, (2009)
- [3] Amoroso E., Taylor C., Watson J., Weiss J., A process-oriented methodology for assessing and improving software trustworthiness, Proc. of the ACM Conf. on Computer and Communications Security (CCS), pp. 39-50, (1994)
- [4] Jin Z., Liu L., Jin Y., Software Requirements Engineering: Principles and Methods, (2008)
- [5] Boehm B., In H., Identifying quality-requirement conflicts, Software, 13, 2, pp. 25-35, (1996)
- [6] Tao H.W., Research on the measurement models of software trustworthiness based on attributes, (2011)
- [7] Moser T., Winkler D., Heindl M., Biffl S., Requirements management with semantic technology: An empirical study on automated requirements categorization and conflict analysis, Proc. of the Advanced Information Systems Engineering, pp. 3-17, (2011)
- [8] Mairiza D., Zowghi D., Constructing a catalogue of conflicts among non-functional requirements, Proc. of the Evaluation of Novel Approaches to Software Engineering, Communications in Computer and Information Science, 230, pp. 31-44, (2011)
- [9] Boehm B., Bose P., Horowitz E., Lee M., Software requirements as negotiated win conditions, Proc. of the ICRE'94, pp. 74-83, (1994)
- [10] Boehm B., Bose P., Horowitz E., Lee M., Software requirements negotiation and renegotiation aids: A theory-W based spiral approach, Proc. of the ICSE'95, (1995)