Title :
Research on Trusted Programming Technology in Information Security
Author :
Cai Jian-ping ; Xu Wen-ying
Author_Institution :
Sch. of Software Eng., Beijing Univ. of Technol., Beijing, China
Abstract :
With rapid development of IT industry, wide use of internet in all walks of life,and the increasing emergence of various threat models, this paper proposes an important factor in information security- trusted programming technology after a comparison with traditional software quality analysis. Quality attributes and credibility attributes (software complexity, software availability, software reliability and so on) are studied with a focus on the analysis, calculation and measurement of code credibility. This technology expects great utility value to software quality assurance and information security.
Keywords :
Internet; security of data; software quality; software reliability; trusted computing; IT industry; Internet; code credibility; credibility attributes; information security; quality attributes; software availability; software complexity; software quality analysis; software quality assurance; software reliability; threat model; trusted programming technology; utility value; Information security; Programming; Software quality; Software reliability; information security; quality analysis; reliability test; trusted programming;
Conference_Titel :
Communication Systems and Network Technologies (CSNT), 2012 International Conference on
Conference_Location :
Rajkot
Print_ISBN :
978-1-4673-1538-8
DOI :
10.1109/CSNT.2012.115