


default search action
TSA 2014: Taichung, Taiwan
- 2014 International Conference on Trustworthy Systems and their Applications, TSA 2014, Taichung, Taiwan, June 9-10, 2014. IEEE 2014, ISBN 978-1-4799-6565-6

Regular Papers
- Chia-Mei Chen, Je-Ming Lin, Gu Hsin Lai:

Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code. 1-6 - William Cheng-Chung Chu, Chao-Tung Yang

, Chih-Wei Lu, Chih-Hung Chang
, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung:
An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC). 7-13 - Ivor D. Addo, Sheikh Iqbal Ahamed, William Cheng-Chung Chu:

A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers. 14-21 - Yean-Ru Chen, Sao-Jie Chen

, Pao-Ann Hsiung
, I-Hsin Chou:
Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant. 22-28 - Geng-Hao Wu, Nien-Lin Hsueh, Chih-Hung Chang

:
A Framework for Questionnaire-Based Healthcare Application Development. 29-35 - Sandeep Lakkaraju, Dianxiang Xu:

Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare. 36-43 - Shou-Yu Lee, W. Eric Wong, Ruizhi Gao:

Software Safety Standards: Evolution and Lessons Learned. 44-50
Short Papers
- Chuan-Yen Chiang, Yen-Lin Chen

, Pei-Shiun Tsai, Shyan-Ming Yuan
:
A Video Conferencing System Based on WebRTC for Seniors. 51-56 - Tse-Chuan Hsu, Dong-Meau Chang

, Hsin-Jan Lee:
The Study of Application and Evaluation with NoSQL Databases in Cloud Computing. 57-62 - Yao-Hong Tsai, Hsiao-Ping Huang, Hui Rong Wu:

Security Management of Authentication System Based on Dynamic Biometric Features. 63-68 - Chyuan-Huei Thomas Yang, Yen Ting Hsu, Chien-Cheng Wu, Jun-Wei Chang:

Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images. 69-74 - Jhe-Jyun Guo, Nien-Lin Hsueh, Wen-Tin Lee, Shi-Chuen Hwang:

Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring Approach. 75-79 - Liang Wang, Li Yao:

An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture. 80-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














