Article Preview
TopIn recent years, domestic and foreign research institutions and scholars have done many related works on trusted component from different perspectives.
There have been some works (Franco, Barbosa, & Zenha-Rela, 2013; Panwar & Garg, 2013; Zuo & Hu, 2009; Rathod & Parmar, 2012; and Wang & Chen, 2012) on the research of evaluation and evolution of trusted component. In five recent papers (Shafiu & Singh, 2016; Law, Verville, & Taskin, 2011; Brahimi, Seinturier, & Boufaida, 2009; Li, Li, & Wang, 2013; and Shanmugapriya & Suresh, 2012) the authors analyzed the reliability of component and discussed the trusted component modeling and algorithm efficiency.
Wang, Tang, Yin, & Li (2006) proposed a trusted concept model of Internet software for Internet virtual computing environment (iVCE), and the network software trusted guarantee system, which assembles identity creditability, capability creditability and behavior creditability. In addition, they argued that the online adjustment of environmental adaptability was an important part of credible evolution, thus proposed a component model that supports the fine-grained online adjustment of software environment adaptability (Ding, Wang, Shi, & Li, 2011).