{"title":"Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring Approach","authors":"Jhe-Jyun Guo, Nien-Lin Hsueh, Wen-Tin Lee, Shi-Chuen Hwang","doi":"10.1109/TSA.2014.21","DOIUrl":"https://doi.org/10.1109/TSA.2014.21","url":null,"abstract":"The effectiveness of the design patterns has been an important research topic in the software engineering area. Since uncontrolled use of design patterns results in serious problem of maintenance. Good code comments can help maintainers understand the design of the software, thus avoid the wrong utilization of design patterns. In this paper we will in our refactoring approach that can add pattern comment line to improve the software maintains for a pattern-based software.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"4 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture","authors":"Liang Wang, L. Yao","doi":"10.1109/TSA.2014.22","DOIUrl":"https://doi.org/10.1109/TSA.2014.22","url":null,"abstract":"Both in daily classrooms and at enterprises conferences, timely feedback from the audience and students are very important for chairmen or teachers. This will improve chairmen's or teachers' working and teaching efficiency in the interaction, because they can promptly know their audience's ideas and comprehension about the contents which they are describing. In this paper, we present software that can obtain timely feedback through intelligent mobile terminals rather than additional hardware. This software uses service-oriented technology to accomplish the interoperability and flexibility among different operating systems. Since it supports two-way communication and multiple-choice questions as well as short-answer questions are allowed to be released, the software system uses a certain algorithm to realize the statistics and analysis of the results for various questions.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers","authors":"Ivor D. Addo, Sheikh Iqbal Ahamed, W. Chu","doi":"10.1109/TSA.2014.12","DOIUrl":"https://doi.org/10.1109/TSA.2014.12","url":null,"abstract":"As the adoption rate of Cloud Computing continues to clamber on among various application archetypes, there is a growing concern for identifying reliable automatic failover solutions between various cloud providers in an attempt to minimize the effect of recent cloud provider outages among diverse always-on and mission-critical applications in healthcare, e-Commerce and ancillary settings. Automatic failover between cloud providers stands out as a solution for course-plotting application reliability requirements in support of high-availability, disaster recovery and high-performance scenarios. Using a case study involving Microsoft's Windows Azure cloud and the Google App Engine cloud solution, we investigate some of the key characteristics in this area of concern and present a reference architecture for automatic failover between multiple Platform-as-a-Service (PaaS) cloud delivery providers in a bid to maximize the delivery of architecturally significant quality attributes pertaining to High-Availability, Performance and Disaster Recovery in a mission-critical application prototype.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133805819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code","authors":"Chia-Mei Chen, Je-Ming Lin, G. Lai","doi":"10.1109/TSA.2014.10","DOIUrl":"https://doi.org/10.1109/TSA.2014.10","url":null,"abstract":"Mobile devices have become powerful and popular. Most Internet applications are ported to mobile platform. Confidential personal information such as credit card and passwords are stored in mobile device for convenience. Therefore, mobile devices become the attack targets due to financial gain. Mobile applications are published in many market platforms without verification, hence malicious mobile applications can be deployed in such marketplaces. Two approaches for detecting malware, dynamic and static analysis, are commonly used in the literature. Dynamic analysis requires is that analyst run suspicious apps in a controlled environment to observe the behavior of apps to determine if the app is malicious or not. However, Dynamic analysis is time consuming, as some mobile application might be triggered after certain amount of time or special input sequence. In this paper static analysis is adopted to detect mobile malware and sensitive information is tracked to check if it is been released or used by malicious malware. In this paper, we present a mobile malware detection approach which is based on data flow of the reversed source code of the application. The proposed system tracks the data flow to detect and identify malicious behavior of malware in Android system. To validate the performance of proposed system, 252 malware form 19 families and 50 free apps from Google Play are used. The results proved that our method can successfully detecting malicious behaviours of Android APPs with the TPR 91.6%.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images","authors":"C. Yang, Y. Hsu, Chien-Cheng Wu, Jun-Wei Chang","doi":"10.1109/TSA.2014.20","DOIUrl":"https://doi.org/10.1109/TSA.2014.20","url":null,"abstract":"In this paper we propose a reversible high capacity data hiding method applying on binary images. Since a binary image has only two colours, black or white. It is a trade-off between capacities and imperceptions in data hiding. We shuffle the secret data by a pseudo-random number generator before hiding to keep more secure. We divide the host image into nonoverlapping four by four sub-blocks, which the secret data will be concealed. Then we partition each four by four sub-block into four overlapping three by three sub-blocks. We skip the all blacks or all whites in four by four sub-blocks. We consider all four three by three sub-block to check the XOR between upper left and center, upper right and center, bottom left and center or bottom right and center, then embed one bit in each three by three sub-block. The extraction way is simply to test the XOR between the four corner pixels and the centers of each three by three sub-block. All embedding bits are collected and shuffled back to the original order. We use the same other host image to keep the record during embedding steps to reach the reversible. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"13 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare","authors":"Sandeep Lakkaraju, Dianxiang Xu","doi":"10.1109/TSA.2014.15","DOIUrl":"https://doi.org/10.1109/TSA.2014.15","url":null,"abstract":"Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. This research addresses this issue by developing a methodology for integrated modeling and analysis of organizational workflows and attribute-based access control policies. This methodology can help identify workflow activities that are not being protected by access control policies and improve existing access control policies. In addition to subjects, resources, and actions, our methodology introduces 'environment' as a new element to workflow activity. This allows more contextual information to be associated with workflow activity for access control analysis.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yean-Ru Chen, Sao-Jie Chen, Pao-Ann Hsiung, I. Chou
{"title":"Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant","authors":"Yean-Ru Chen, Sao-Jie Chen, Pao-Ann Hsiung, I. Chou","doi":"10.1109/TSA.2014.13","DOIUrl":"https://doi.org/10.1109/TSA.2014.13","url":null,"abstract":"Critical systems have very stringent requirements on both security and safety. Recent mishaps such as the missing MH370 aircraft and the sunk Korean Sewol ferry go to show that our technology in safety and security risk assessment still need a more integrated approach. Nuclear plant meltdown in the recent Fukushima accident is also a typical example of insufficient risk assessments. This work is a case study on how a unified security and safety risk assessment methodology may be applied to a High Pressure Core Flooder (HPCF) system in a nuclear power plant. Individual risk security or safety assessments may overlook the possible higher risk associated with such critical systems. The case study shows how the proposed method provides a more accurate risk assessment compared to individual assessments.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of Application and Evaluation with NoSQL Databases in Cloud Computing","authors":"Tse-Chuan Hsu, Dong-Meau Chang, Hsin-Jan Lee","doi":"10.1109/TSA.2014.18","DOIUrl":"https://doi.org/10.1109/TSA.2014.18","url":null,"abstract":"Access reliability based of information is an important factor affecting cloud applications. In this research investigates on how Heroku cloud systems necessity file system database publishing technology, with different conditions to test the read and write data access capabilities. To facilitate comparison, will use the commercial database Mongo DB and Posgres SQL as a test database and the study will establish the local Postgres SQL database as a control group. The purpose of this study was to investigate the cloud computing environment, the credibility of information use in the different database structures. About the test case, we will conduct the contains data writing, reading, and query tests. The results of this study support through a new type of cloud resource sales force Heroku subordinate mode to explore, study the behavior of software services used in commercial construction and deployment validation tests will help in the understanding of cloud architecture, design structure in different databases, data use analysis reliabilities.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Questionnaire-Based Healthcare Application Development","authors":"Geng-Hao Wu, Nien-Lin Hsueh, Chih-Hung Chang","doi":"10.1109/TSA.2014.14","DOIUrl":"https://doi.org/10.1109/TSA.2014.14","url":null,"abstract":"Mobile healthcare application development is now facing more challenges than before. How to improve the development speed is an important issue in this area. In this paper, we provide a framework to help developers build applications quickly and easily. Our framework has two features: (1) proposing a questionnaire-based healthcare framework to provide good extensibility for validating user input, judging medical rule and adding sensors. (2) Extending QTI to support sensor input in a questionnaire. We also demonstrate how to develop an application based on the framework.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"37 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung
{"title":"An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC)","authors":"W. Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung","doi":"10.1109/TSA.2014.11","DOIUrl":"https://doi.org/10.1109/TSA.2014.11","url":null,"abstract":"Enterprise Cloud Computing (ECC) is a new trend for IT service provisioning due to the concerns of cost down and increase of Quality of Service (QoS). However, there are many obstacles to the services moving from traditional enterprise computing to cloud environment, such as how to assure the quality of services, security, data availability, data privacy, etc. In order to support the risk free migration of IT provisioning for enterprises from traditional enterprise architecture to cloud computing, an integrated solution is urgently needed. In this paper, we propose a formal model, to assist not only the ECC services design and construction through SaaS, PaaS, IaaS, but also the simultaneous monitoring and dynamic analysis on the QoS factors for the promises from QoS service providers, such as security, performance, timeliness, throughput, reliability, and the service level agreements (SLAs) for multiple ECC consumers. Based on the formal model, analysis model and testing model can be generated consequently to support automatic testing as well as run time monitoring to assure the satisfaction to the requirements/SLAs constraints.","PeriodicalId":127413,"journal":{"name":"2014 International Conference on Trustworthy Systems and their Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}