Abstract
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method based on the application behavior declaration (ABD), in which the application of software credibility validation process and the software behavior declaration definition statement are put forward. In the integration of the process and the software development life cycle, the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Trusted Computing Group. TCG Architecture Overview Specification revision [EB/OL]. [2009-03-08]. http://www. trustedcomputinggroup.org.
Shen C X, Zhang H G, Wang H M. Research and development of trusted computing [J]. Chinese Science: Information Science, 2010, 40(2): 139–156(Ch).
Zhuang L, Cai M, Li C. Trusted dynamic measurement based on software behavior[J]. Journal of Wuhan University (Natural Science Edition), 2010, 56(2):133–137(Ch).
Shen Z D, Tong Q. The security of clouding computing system enabled by trusted computing technology[C] // 2010 2nd International Conference on Signal Processing System (ICSPS). Piscataway N J: IEEE Computer Society, V211-V215 2010.
Shen Z D, Li L, Yan F, et al. Cloud computing system based on trusted computing platform[C] // Intelligent Computation Technology and Automation (ICICA). Piscataway N J: IEEE Computer Society,2010: 942–945.
Su D. A software behavior dynamic trusted research method and its trusted elements [J]. Network Security Technology and Application, 2013, (4): 14–17.
Li Q T, Lin C, Yang N. Evaluation of user behavior trust in cloud computing[C] // Computer Application and System Modeling. Piscataway N J: IEEE Computer Society, 2010: V7-567-V7-572.
Yang F, Wu J X, Tang S Y, et al. Dynamic knowledge repository-based security auxiliary system of user behavior [C] // 2013 IEEE and Internet of Things. Piscataway N J: IEEE Computer Society, 2013: 2081–2084.
Duguandji E R, Pocrthuis A, Van Meeteren M. Modeling user behavior in adoption and diffusion of twitter clients [C] // 2011 IEEE Third International Conference on Social Security. Piscataway N J: IEEE Computer Society, 2011: 1372–1379.
Liu W, Ren P, Liu K, et al. User cooperation trust model and its application in network security management [C] // 2011 Eighth International Conference on Fuzzy System and Knowledge Discovery. Piscataway N J: IEEE Computer Society, 2011:2335–2339.
Yang X H. Research on Dynamic Credible Theory Model of Software Behavior [D]. Hefei: University of Science and Technology of China, 2010 (Ch).
Gan T, Lin F H, Chen C J, et al. User behaviors analysis in Website identification registration [J]. China Communication, 2013,(3): 76–81.
Wei H, Chen X Y, Wang C. User behavior analyses based on network data stream scenario [C] // 2012 IEEE 14th International Conference on Communication Conference. Piscataway N J: IEEE Press, 2012: 1017–1021.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by Foundation of the National Public Scientific Research (201210262)
Biography: YU Xuejun, female, Ph.D., Associate professor, research direction: software engineering, software credibility validation.
Rights and permissions
About this article
Cite this article
Yu, X., Jiang, G., Wang, P. et al. Research on application’s credibility verification based on ABD. Wuhan Univ. J. Nat. Sci. 21, 63–68 (2016). https://doi.org/10.1007/s11859-016-1139-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-016-1139-8