Computer Science ›› 2015, Vol. 42 ›› Issue (12): 224-228.
Previous Articles Next Articles
LI Jian-fei, XU Kai-yong and JIN Lei
[1] 赵雨水,左青,杨立,等.软件发布机制体系结构研究[J].计算机工程与设计,2010,1(4):700-705 Zhao Yu-shui,Zuo Chun,Yang Li,et al.Architecture for software distribution[J].Computer Engineering and Design,2010,1(4):700-705 [2] 刘甜.软件发布机制的研究与应用[D].石家庄:石家庄铁道大学,2014(下转第262页)(上接第228页)Liu Tian.Research and Application of Software Distribution Mechanism[D].Shijiazhuang:Shijiazhuang Tiedao University,2014 [3] 王华,刘焕敏,冯朝阳,等.一种分布式软件发布部署系统[J].计算机系统应用,2012,21(2):1-4 Wang Hua,Liu Huan-min,Feng Zhao-yang,et al.Distributed Software Release and Disposition System[J].Computer Systems & Applications,2012,1(2):1-4 [4] 陈伟,魏峻,黄涛.W4H:一个面向软件部署的技术分析框架[J].软件学报,2012,23(7):1669-1687 Chen Wei,Wei Jun,Huang Tao.W4H:An Analytical Framework for Software Deployment Technologies[J].Journal of Software,2012,3(7):1669-1687 [5] Malek S,Medvidovic N,Mikic-Rakic M.An extensible framework for improving a distributed software system’s deployment architecture[J].IEEE Trans.on Software Engineering,2012,38(1):73-100 [6] 张娴.基于可信计算的软件安全下载设计与实现[D].西安:西安电子科技大学,2010 Zhang Xian.Design and Implement of Software Secure Downloading Based on Trusted Computing[D].Xi’an:Xidian University,2010 [7] Virvilis N,Gritzalis D.Trusted Computing vs Advanced Persistent Threats:Can a defender win this game?[C]∥2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing,and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC).2013:396-403 [8] 蒋泽.可信网络中用户行为可信评估的研究[D].重庆:重庆大学,2011 Jiang Ze.Study on Evaluation of User Behavior Trust in Trusted Network[D].Chongqing:Chongqing University,2011 [9] 林闯,田立勤.可信网络中用户行为可信评价的研究[J].计算机研究与发展,2008,45(12):2033-2043 Lin Chuang,Tian Li-qin.Research on User Behavior Trust in Trustworthy Network[J].Journal of Computer Research and Development,2008,5(12):2033-2043 [10] 温博为.可信计算平台技术应用研究[D].西安:陕西师范大学,2013 Wen Bo-wei.Application Research on Trusted Computing Platform Technology[D].Xi’an:Shaanxi Normal University,2013 [11] 王志勇.基于行为声明的动态可信度量技术研究[D].北京:北京工业大学,2013 Wang Zhi-yong.Dynamic Trustworthiness Measurement Technology Based on Behavior Declaration[D].Beijing:Beijing University of Technology,2013 [12] 曾梦岐,卿昱,谭平璋,等.一种基于标识认证的信任链建立方法[C]∥第一届中国可信理论与实践学术会议论文集.北京:清华大学出版社,2009 Zeng Meng-qi,Qing Yu,Tan Ping-zhang,et al.Establishment Method of Trust Chain Based on Identity Authentication[C]∥Proceedings of the first China credible theory and practice conference.Beijing:Tsing Hua University Press,2009 [13] 孙迪.软件行为可信技术研究[D].北京:北京工业大学,2013 Sun Di.Research on Software Behavior Trustworthy Technology[D].Beijing:Beijing University of Technology,2013 [14] Ruiz J L,Duenas J C,Usro F,et al.Deployment in dynamic environments[C]∥DECOR04 (2004).2004:85-98 [15] Hall R,Heimbigner D,Wolf A L.Specifying the DeployableSoftware Description Format in XML: CU-SERL-207-99[R].Software Engineering Research Laboratory,University of Colorado,1999 [16] Hall R S,Heimbigner D,Wolf A L.Evaluating Software Deployment Languages and Schema[C]∥14th IEEE InternationalConference on Software Maintenance (ICSM’98).1998:177 [17] Van Hoff A,Partovi H,Thai T.The Open Software DescriptionFormat (OSD).http://www.w3.org /TR/NOTE-OSD [18] Distributed Management Task Force.Common InformationModel (CIM) Specification(Version 3.0).http://www.dmtf.org/spec/cim_spec_v30 [19] Coupaye T,Estublier J.Foundations of enterprise software deployment[C]∥Proc.of the Euromicro Conf.on Software Maintenance and Reengineering.Zurich:IEEE Computer Society,2000 [20] 王怀民,唐扬斌,尹刚,等.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169 Wang Huai-min,Tang Yang-bin,Yin Gang,et al.Trustworthiness Mechanism of Internet Software[J].Science in China (Series E),2006,6(10):1156-1169 |
No related articles found! |
|