Acknowledgement
The work reported in this paper is carried out in the Institute of Complex Networks and Visualization at Shijiazhuang Tiedao University in China. The research is partially funded by the third batch of innovation teams and leading talents plan, funding number "JIZIBAN [2018]33" (Hebei, China).
References
- Z. Liu and L. Sun, "The development and prospects of interplanetary transportation system," Science China Technological Sciences, vol. 42, no. 5, pp. 493-504, 2012.
- N. G. Leveson, "Role of software in spacecraft accidents," Journal of Spacecraft and Rockets, vol. 41, no. 4, pp. 564-575, 2004. https://doi.org/10.2514/1.11950
- P. Athalye, D. Maksimovic, and R. Erickson, "High-performance front-end converter for avionics applications [aircraft power systems]," IEEE Transactions on Aerospace and Electronic Systems, vol. 39, no. 2, pp. 462-470, 2003. https://doi.org/10.1109/TAES.2003.1207258
- G. H. Shen, Z. Q. Huang, B. Xie, Y. Zhu, L. Liao, F. Wang, and Y. Liu, "Survey on software trustworthiness evaluation: standards, models and tools," Journal of Software (Ruanjian Xuebao), vol. 27, no. 4, pp. 955-968, 2016.
- H. S. Kim and E. Lee, "Verifying code toward trustworthy software," Journal of Information Processing Systems, vol. 14, no. 2, pp. 309-321, 2018. https://doi.org/10.3745/JIPS.01.0027
- S. Lipner, "The trustworthy computing security development lifecycle," in Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, 2004, pp. 2-13.
- Trusted Computing Group, "TCG specification architecture overview," [Online]. Available: https://trustedcomputinggroup.org/resource-directory/specifications/
- Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models, ISO/IEC 25010:2011, 2011.
- L. Shi and S. Yang, "The evaluation of software trustworthiness with FAHP and FTOPSIS methods," in Proceedings of 2009 International Conference on Computational Intelligence and Software Engineering, Wuhan, China, 2009, pp. 1-5.
- Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model, ISO/IEC 15408-1:2009, 2009.
- Software engineering - Product quality - Part 4: Quality in use metrics, ISO/IEC TR 9126-4:2004, 2004.
- H. Wang, "TRUSTIE: design of a trustworthy software production environment," in Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011, pp. 3-4.
- K. Liu, Z. Shan, J. Wang, J. He, Z. Zhang, and Y. Qin, "Overview on major research plan of trustworthy software," Bulletin of National Natural Science Foundation of China, vol. 22, no. 3, pp. 145-151, 2008. https://doi.org/10.3969/j.issn.1000-8217.2008.03.005
- Systems and software engineering - Software life cycle processes, ISO/IEC 12207:2008, 2018.
- Information technology - Process assessment - Part 5: An exemplar software life cycle process assessment model, ISO/IEC 15504-5:2012, 2012.
- M. B. Chrissis, M. Konrad, and S. Shrum, CMMI for Development: Guidelines for Process Integration and Product Improvement. Upper Saddle River, NJ: Addison-Wesley, 2011.
- M. Tang, D. Y. Sun, B. Li, C. M. Ou, Z. H. Lin, and Z. Li, "Research on the evaluation method of national military development based on net assessment," in Proceedings of 2015 European Intelligence and Security Informatics Conference, Manchester, UK, 2015, pp. 129-132.
- M. Drapeau and L. Wells, "Social software and national security: an initial net assessment," 2009; https://apps.dtic.mil/docs/citations/ADA497525.
- R. Proctor, "The evolving terrorist threat to Southeast Asia: a net assessment," Asian Affairs, vol. 43, no. 1, pp. 150-152, 2012. https://doi.org/10.1080/03068374.2012.642596
- D. Lin, "Discover the secret of 'The Strait of Terror'," National Defense, vol. 2002, no. 7, pp. 4-6, 2002.
- G. Yan, "The US Department of Defense definition of net assessment theory, methods and practice," International Data Information, vol. 2011, no. 5, pp. 30-36, 2011.
- B. Yi and W. Li, "The US Army's net assessment methods of strategic," Military Operations Research and Systems Engineering, vol. 26, no. 3, pp. 14-18, 2012.
- L. Yuan, H. M. Wang, G. Yin, D. Shi, and Y. Zhu, "An automatic evaluation evidence framework for open source software," Journal of Chinese Computer Systems, vol. 32, no. 11, pp. 2145-2151, 2011.
- Y. M. Zhou and W. H. Li, "Enhanced FAHP and its application to task scheme evaluation," Computer Engineering and Applications, vol. 44, no. 5, pp. 212-214, 2008. https://doi.org/10.3778/j.issn.1002-8331.2008.05.067
- Q. Cheng, "Structure entropy weight method to confirm the weight of evaluating index," Systems Engineering Theory & Practice, vol. 30, no. 7, pp. 1225-1228, 2010.
- Z. X. Zhao, The Use and Promotion of NeoKylin Operating System. Beijing, China: Science Press, 2015.
- Z. X. Zhao, J. J. Wen, and W. H. Zhao, Z Notation and Its Usage. Beijing, Chian: Science Press, 2015.