{"id":2432,"date":"2025-02-16T13:43:41","date_gmt":"2025-02-16T05:43:41","guid":{"rendered":"https:\/\/www.15zhi.net\/blog\/?page_id=2432"},"modified":"2025-05-05T16:18:04","modified_gmt":"2025-05-05T08:18:04","slug":"a-contracted-container-based-code-component-collaboration-model-with-reusable-but-invisible-right-management","status":"publish","type":"page","link":"https:\/\/www.15zhi.net\/blog\/a-contracted-container-based-code-component-collaboration-model-with-reusable-but-invisible-right-management\/","title":{"rendered":"A contracted container-based code component collaboration model with reusable but invisible right management"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-accent-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading\">Background &amp; Engineering Issues<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p>Software architectures such as CBSD, SOA and microservices drive the advancement of software engineering, while software technologies such as CI\/CD, DevOps and containerization increase the efficiency of software development.<\/p>\n\n\n\n<p>However, existing architectures and code collaboration methods have the following drawbacks.<\/p>\n\n\n\n<p>(1) Insecure centralized management. Existing methods rely on trusted third parties (TTP) to centrally manage data and server resources. However, if TTP experiences system crashes or internal corruption, all data or resources involved in software collaboration would be at security risk.<\/p>\n\n\n\n<p>(2) Unreliable communication. Without reliable safeguards, the cross-team communication process is vulnerable to malicious attacks, resulting in the loss or corruption of exchanged information and subsequently reducing the credibility of information.<\/p>\n\n\n\n<p>(3) Leakage of privacy data. Source code can be read arbitrarily from the shared mainline during processes of integration and deployment. This indicates a lack of emphasis on protecting original copyrights.<\/p>\n\n\n\n<p>(4) Unavailable system\/service. Existing methodologies fail to identify and clear unavailable systems or services immediately, wasting a lot of computing resources.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-549b0c86 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-global-padding is-content-justification-left is-layout-constrained wp-container-core-column-is-layout-4f15e8fe wp-block-column-is-layout-constrained\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading\">Contributions<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">1<\/h3>\n\n\n\n<p class=\"wp-container-content-9cfa9a5a\">We propose a decentralized storage network infrastructure with a blockchain and an off-chain file storage system, which can support trustworthy transaction processing by using a built-in consensus mechanism.                                       <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3<\/h3>\n\n\n\n<p>A cross-node communication protocol is designed, aiming to guarantee the reliability and integrity of messages during the cross-team communication process.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">2<\/h3>\n\n\n\n<p>Three smart contracts are designed to realize reusable but invisible code collaboration, including decentralized access control, establishment and verification of code copyrights, and generation and supervision of containers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4<\/h3>\n\n\n\n<p>We implement communication a prototype process. system to evaluate the model security and performance, and verify that our model can resist common attacks and have significant advantages compared to existing solutions.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading has-text-align-left\">Problem Formulation<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h3 class=\"wp-block-heading\">Attacker model<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Single point of failure. Any single component of the system can be subject to mistakes or malicious attacks.<\/p>\n\n\n\n<p>Collusion attacks. Two or more malicious entities collaborate to conduct an attack or breach together.<\/p>\n\n\n\n<p>Man-in-the-middle attacks. The attacker attempts to insert himself as an intermediary between two communicating parties in order to steal, tamper with or interfere with the communication data stream.<\/p>\n\n\n\n<p>Replay attacks. To spoof the system, the attacker sends data packets that have already been received by the destination host.<\/p>\n\n\n\n<p>Sybil attacks. A small number of nodes in a peer-to-peer network control multiple fake identities and then use these identities to control or influence a large number of normal nodes in the network.<\/p>\n\n\n\n<p>Blockify attacks. The attacker tries to access the private blockchain, get the current block, and then change or delete the block information.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h3 class=\"wp-block-heading\">Design goals<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Mutual authentication. To ensure that the identities of participants in code collaboration are trustworthy, we use blockchain to verify digital identities and organizations. Only authorized users can participate in code component collaboration.<\/p>\n\n\n\n<p>Autonomy. The process of generating code copyrights and containers is controlled by smart contracts instead of relying on TTP.<\/p>\n\n\n\n<p>Privacy protection. The workflow of our model cannot leak privacy code. We ensure that privacy data is encrypted during collaboration process.<\/p>\n\n\n\n<p>Traceability. Privacy data and transaction records are stored in the blockchain for tracing the history.<\/p>\n\n\n\n<p>Integrity. Ensure that the integrity of messages transmitted by nodes can be checked and verified.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-549b0c86 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-global-padding is-content-justification-left is-layout-constrained wp-container-core-column-is-layout-4f15e8fe wp-block-column-is-layout-constrained\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading\">Proposed Model<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u2014\u2014 Overview<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p>The proposed model is divided into four parts. First, four modules are designed to achieve the goal of code collaboration and reusable but invisible right management. Then, there are three smart contracts and a consensus mechanism. Next, a cross-node communication protocol is designed to secure data exchanges.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"522\" src=\"http:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-1024x522.jpg\" alt=\"\" class=\"wp-image-2443\" style=\"width:577px;height:auto\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-1024x522.jpg 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-300x153.jpg 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-768x392.jpg 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-1536x783.jpg 1536w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig1-2048x1044.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Details of module design are shown in the following figure.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"http:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-1024x550.jpg\" alt=\"\" class=\"wp-image-2444\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-1024x550.jpg 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-300x161.jpg 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-768x412.jpg 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-1536x824.jpg 1536w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/Fig2-2048x1099.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>P2PTCN design<\/strong><\/h5>\n\n\n\n<p>P2PTCN (<em>peer-to-peer trusted collaboration network<\/em>) is based on blockchain, IPFS and smart contracts, providing a trusted computing network and storage management service for other modules.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1024x456.png\" alt=\"\" class=\"wp-image-2454\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1024x456.png 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-300x133.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-768x342.png 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image.png 1261w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>FOAC design<\/strong><\/h5>\n\n\n\n<p>FOAC (<em>filing-oriented access control model<\/em>) is a decentralized access control technology, providing mutual authentication.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"783\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1.png\" alt=\"\" class=\"wp-image-2455\" style=\"width:657px;height:auto\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1.png 894w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1-300x263.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-1-768x673.png 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Code copyright management module design<\/strong><\/h5>\n\n\n\n<p>The code copyright management module supports code integration and privacy protection, including task allocation and collaboration for code components, version control of privacy code component and code copyright management.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"783\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-2.png\" alt=\"\" class=\"wp-image-2456\" style=\"width:614px;height:auto\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-2.png 931w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-2-300x252.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-2-768x646.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Containerized compilation module design<\/strong><\/h5>\n\n\n\n<p>The containerized compilation module can automate the creation of containers from code components. The module can also credibly supervise container instances without relying on TTP, thus protecting the privacy of container data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"696\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-3-1024x696.png\" alt=\"\" class=\"wp-image-2457\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-3-1024x696.png 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-3-300x204.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-3-768x522.png 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-3.png 1111w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Information communication protocol design<\/strong><\/h5>\n\n\n\n<p><strong><em>For question<\/em><\/strong>: Since we assume attackers exist in the distributed collaborative environment, how do we determine that messages or data transmitted between nodes in P2PTCN are complete and have not been tampered with? How do we ensure that even if information is intercepted during transmission, attackers cannot obtain any useful data?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"402\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-4-1024x402.png\" alt=\"\" class=\"wp-image-2459\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-4-1024x402.png 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-4-300x118.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-4-768x302.png 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-4.png 1100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Consensus design<\/strong><\/h5>\n\n\n\n<p><strong><em>For question<\/em><\/strong>: How to ensure mutual trust and data consistency between blockchain nodes in P2PTCN?<\/p>\n\n\n\n<p class=\"has-text-align-left\">We introduce a consensus mechanism which is based on RAFT. For details, please refer to the <a href=\"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457324004163\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#e81c1c\" class=\"has-inline-color\">paper<\/mark><\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h2 class=\"wp-block-heading\">Model Validation &amp; Analysis<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p>Here, we only provide comparative results to demonstrate the advantages of our model. For details, please refer to the <a href=\"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457324004163\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#654321\" class=\"has-inline-color\">paper<\/mark><\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"226\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-6-1024x226.png\" alt=\"\" class=\"wp-image-2463\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-6-1024x226.png 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-6-300x66.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-6-768x170.png 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-6.png 1501w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"311\" src=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-5-1024x311.png\" alt=\"\" class=\"wp-image-2462\" srcset=\"https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-5-1024x311.png 1024w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-5-300x91.png 300w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-5-768x233.png 768w, https:\/\/www.15zhi.net\/blog\/wp-content\/uploads\/2025\/02\/image-5.png 1090w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-color has-contrast-background-color has-text-color has-background has-link-color wp-elements-ca5477a63ee2c401fefae1b2243a656c has-global-padding is-layout-constrained wp-container-core-group-is-layout-facafb6f wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d1c656ed wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:0;flex-basis:60%\">\n<h2 class=\"wp-block-heading\" style=\"min-height:100%\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-base-color\">Limitations<\/mark><\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<p class=\"has-text-align-left\">Decentralized storage and management of the model relies heavily on blockchain and IPFS. With the growth of blockchain network scale, the time and computational resources required for consensus and data verification will increase significantly, potentially impacting the scalability and performance of the model in large-scale projects.<\/p>\n\n\n\n<p>Next, although our model improves security through encryption and decentralized management, the additional layers of encryption, signature verification and consensus mechanisms may result in extra latency. This overhead may affect real-time collaboration, especially when many distributed nodes are involved in the workflow.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">LINK<\/h2>\n\n\n\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.ipm.2024.104057\">Wang W, Xie Z. A contracted container-based code component collaboration model with reusable but invisible right management[J]. Information Processing &amp; Management, 2025, 62(3): 104057.<\/a><\/p>\n\n\n\n<p>Source code: <a href=\"https:\/\/github.com\/kcisgroup\/2025WangWei\">https:\/\/github.com\/kcisgroup\/2025WangWei<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background &amp; Engineering Issues Software architectu [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2432","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/pages\/2432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/comments?post=2432"}],"version-history":[{"count":36,"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/pages\/2432\/revisions"}],"predecessor-version":[{"id":3056,"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/pages\/2432\/revisions\/3056"}],"wp:attachment":[{"href":"https:\/\/www.15zhi.net\/blog\/wp-json\/wp\/v2\/media?parent=2432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}