2014 International Conference on Trustworthy Systems and their Applications最新文献

筛选
英文 中文
Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring Approach 改进基于模式的软件开发的软件维护:一种注释重构方法
Jhe-Jyun Guo, Nien-Lin Hsueh, Wen-Tin Lee, Shi-Chuen Hwang
{"title":"Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring Approach","authors":"Jhe-Jyun Guo, Nien-Lin Hsueh, Wen-Tin Lee, Shi-Chuen Hwang","doi":"10.1109/TSA.2014.21","DOIUrl":"https://doi.org/10.1109/TSA.2014.21","url":null,"abstract":"The effectiveness of the design patterns has been an important research topic in the software engineering area. Since uncontrolled use of design patterns results in serious problem of maintenance. Good code comments can help maintainers understand the design of the software, thus avoid the wrong utilization of design patterns. In this paper we will in our refactoring approach that can add pattern comment line to improve the software maintains for a pattern-based software.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"4 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture 基于面向服务体系结构的会议或课堂交互式软件
Liang Wang, L. Yao
{"title":"An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture","authors":"Liang Wang, L. Yao","doi":"10.1109/TSA.2014.22","DOIUrl":"https://doi.org/10.1109/TSA.2014.22","url":null,"abstract":"Both in daily classrooms and at enterprises conferences, timely feedback from the audience and students are very important for chairmen or teachers. This will improve chairmen's or teachers' working and teaching efficiency in the interaction, because they can promptly know their audience's ideas and comprehension about the contents which they are describing. In this paper, we present software that can obtain timely feedback through intelligent mobile terminals rather than additional hardware. This software uses service-oriented technology to accomplish the interoperability and flexibility among different operating systems. Since it supports two-way communication and multiple-choice questions as well as short-answer questions are allowed to be released, the software system uses a certain algorithm to realize the statistics and analysis of the results for various questions.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers PaaS云提供商之间高可用性自动故障转移的参考体系结构
Ivor D. Addo, Sheikh Iqbal Ahamed, W. Chu
{"title":"A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers","authors":"Ivor D. Addo, Sheikh Iqbal Ahamed, W. Chu","doi":"10.1109/TSA.2014.12","DOIUrl":"https://doi.org/10.1109/TSA.2014.12","url":null,"abstract":"As the adoption rate of Cloud Computing continues to clamber on among various application archetypes, there is a growing concern for identifying reliable automatic failover solutions between various cloud providers in an attempt to minimize the effect of recent cloud provider outages among diverse always-on and mission-critical applications in healthcare, e-Commerce and ancillary settings. Automatic failover between cloud providers stands out as a solution for course-plotting application reliability requirements in support of high-availability, disaster recovery and high-performance scenarios. Using a case study involving Microsoft's Windows Azure cloud and the Google App Engine cloud solution, we investigate some of the key characteristics in this area of concern and present a reference architecture for automatic failover between multiple Platform-as-a-Service (PaaS) cloud delivery providers in a bid to maximize the delivery of architecturally significant quality attributes pertaining to High-Availability, Performance and Disaster Recovery in a mission-critical application prototype.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133805819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code 基于源代码数据流的移动应用恶意行为检测
Chia-Mei Chen, Je-Ming Lin, G. Lai
{"title":"Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code","authors":"Chia-Mei Chen, Je-Ming Lin, G. Lai","doi":"10.1109/TSA.2014.10","DOIUrl":"https://doi.org/10.1109/TSA.2014.10","url":null,"abstract":"Mobile devices have become powerful and popular. Most Internet applications are ported to mobile platform. Confidential personal information such as credit card and passwords are stored in mobile device for convenience. Therefore, mobile devices become the attack targets due to financial gain. Mobile applications are published in many market platforms without verification, hence malicious mobile applications can be deployed in such marketplaces. Two approaches for detecting malware, dynamic and static analysis, are commonly used in the literature. Dynamic analysis requires is that analyst run suspicious apps in a controlled environment to observe the behavior of apps to determine if the app is malicious or not. However, Dynamic analysis is time consuming, as some mobile application might be triggered after certain amount of time or special input sequence. In this paper static analysis is adopted to detect mobile malware and sensitive information is tracked to check if it is been released or used by malicious malware. In this paper, we present a mobile malware detection approach which is based on data flow of the reversed source code of the application. The proposed system tracks the data flow to detect and identify malicious behavior of malware in Android system. To validate the performance of proposed system, 252 malware form 19 families and 50 free apps from Google Play are used. The results proved that our method can successfully detecting malicious behaviours of Android APPs with the TPR 91.6%.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images 基于异或的双主机图像可逆数据隐藏方法
C. Yang, Y. Hsu, Chien-Cheng Wu, Jun-Wei Chang
{"title":"Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images","authors":"C. Yang, Y. Hsu, Chien-Cheng Wu, Jun-Wei Chang","doi":"10.1109/TSA.2014.20","DOIUrl":"https://doi.org/10.1109/TSA.2014.20","url":null,"abstract":"In this paper we propose a reversible high capacity data hiding method applying on binary images. Since a binary image has only two colours, black or white. It is a trade-off between capacities and imperceptions in data hiding. We shuffle the secret data by a pseudo-random number generator before hiding to keep more secure. We divide the host image into nonoverlapping four by four sub-blocks, which the secret data will be concealed. Then we partition each four by four sub-block into four overlapping three by three sub-blocks. We skip the all blacks or all whites in four by four sub-blocks. We consider all four three by three sub-block to check the XOR between upper left and center, upper right and center, bottom left and center or bottom right and center, then embed one bit in each three by three sub-block. The extraction way is simply to test the XOR between the four corner pixels and the centers of each three by three sub-block. All embedding bits are collected and shuffled back to the original order. We use the same other host image to keep the record during embedding steps to reach the reversible. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"13 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare 医疗保健中基于属性的访问控制策略和工作流的集成建模和分析
Sandeep Lakkaraju, Dianxiang Xu
{"title":"Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare","authors":"Sandeep Lakkaraju, Dianxiang Xu","doi":"10.1109/TSA.2014.15","DOIUrl":"https://doi.org/10.1109/TSA.2014.15","url":null,"abstract":"Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. This research addresses this issue by developing a methodology for integrated modeling and analysis of organizational workflows and attribute-based access control policies. This methodology can help identify workflow activities that are not being protected by access control policies and improve existing access control policies. In addition to subjects, resources, and actions, our methodology introduces 'environment' as a new element to workflow activity. This allows more contextual information to be associated with workflow activity for access control analysis.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant 统一安全与安全风险评估——以核电站为例
Yean-Ru Chen, Sao-Jie Chen, Pao-Ann Hsiung, I. Chou
{"title":"Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant","authors":"Yean-Ru Chen, Sao-Jie Chen, Pao-Ann Hsiung, I. Chou","doi":"10.1109/TSA.2014.13","DOIUrl":"https://doi.org/10.1109/TSA.2014.13","url":null,"abstract":"Critical systems have very stringent requirements on both security and safety. Recent mishaps such as the missing MH370 aircraft and the sunk Korean Sewol ferry go to show that our technology in safety and security risk assessment still need a more integrated approach. Nuclear plant meltdown in the recent Fukushima accident is also a typical example of insufficient risk assessments. This work is a case study on how a unified security and safety risk assessment methodology may be applied to a High Pressure Core Flooder (HPCF) system in a nuclear power plant. Individual risk security or safety assessments may overlook the possible higher risk associated with such critical systems. The case study shows how the proposed method provides a more accurate risk assessment compared to individual assessments.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Study of Application and Evaluation with NoSQL Databases in Cloud Computing NoSQL数据库在云计算中的应用与评价研究
Tse-Chuan Hsu, Dong-Meau Chang, Hsin-Jan Lee
{"title":"The Study of Application and Evaluation with NoSQL Databases in Cloud Computing","authors":"Tse-Chuan Hsu, Dong-Meau Chang, Hsin-Jan Lee","doi":"10.1109/TSA.2014.18","DOIUrl":"https://doi.org/10.1109/TSA.2014.18","url":null,"abstract":"Access reliability based of information is an important factor affecting cloud applications. In this research investigates on how Heroku cloud systems necessity file system database publishing technology, with different conditions to test the read and write data access capabilities. To facilitate comparison, will use the commercial database Mongo DB and Posgres SQL as a test database and the study will establish the local Postgres SQL database as a control group. The purpose of this study was to investigate the cloud computing environment, the credibility of information use in the different database structures. About the test case, we will conduct the contains data writing, reading, and query tests. The results of this study support through a new type of cloud resource sales force Heroku subordinate mode to explore, study the behavior of software services used in commercial construction and deployment validation tests will help in the understanding of cloud architecture, design structure in different databases, data use analysis reliabilities.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for Questionnaire-Based Healthcare Application Development 基于问卷的医疗保健应用程序开发框架
Geng-Hao Wu, Nien-Lin Hsueh, Chih-Hung Chang
{"title":"A Framework for Questionnaire-Based Healthcare Application Development","authors":"Geng-Hao Wu, Nien-Lin Hsueh, Chih-Hung Chang","doi":"10.1109/TSA.2014.14","DOIUrl":"https://doi.org/10.1109/TSA.2014.14","url":null,"abstract":"Mobile healthcare application development is now facing more challenges than before. How to improve the development speed is an important issue in this area. In this paper, we provide a framework to help developers build applications quickly and easily. Our framework has two features: (1) proposing a questionnaire-based healthcare framework to provide good extensibility for validating user input, judging medical rule and adding sensors. (2) Extending QTI to support sensor input in a questionnaire. We also demonstrate how to develop an application based on the framework.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"37 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC) 一种面向企业云计算的服务质量保证方法
W. Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung
{"title":"An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC)","authors":"W. Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung","doi":"10.1109/TSA.2014.11","DOIUrl":"https://doi.org/10.1109/TSA.2014.11","url":null,"abstract":"Enterprise Cloud Computing (ECC) is a new trend for IT service provisioning due to the concerns of cost down and increase of Quality of Service (QoS). However, there are many obstacles to the services moving from traditional enterprise computing to cloud environment, such as how to assure the quality of services, security, data availability, data privacy, etc. In order to support the risk free migration of IT provisioning for enterprises from traditional enterprise architecture to cloud computing, an integrated solution is urgently needed. In this paper, we propose a formal model, to assist not only the ECC services design and construction through SaaS, PaaS, IaaS, but also the simultaneous monitoring and dynamic analysis on the QoS factors for the promises from QoS service providers, such as security, performance, timeliness, throughput, reliability, and the service level agreements (SLAs) for multiple ECC consumers. Based on the formal model, analysis model and testing model can be generated consequently to support automatic testing as well as run time monitoring to assure the satisfaction to the requirements/SLAs constraints.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信