
With rapid development of IT industry, wide use of internet in all walks of life,and the increasing emergence of various threat models, this paper proposes an important factor in information security- trusted programming technology after a comparison with traditional software quality analysis. Quality attributes and credibility attributes (software complexity, software availability, software reliability and so on) are studied with a focus on the analysis, calculation and measurement of code credibility. This technology expects great utility value to software quality assurance and information security.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
