Title :
Table of contents
Abstract :
The following topics are dealt with: mobile application malicious behavior detection; source code data flow; quality of service; enterprise cloud computing; PaaS cloud providers; security risk assessment; safety risk assessment; nuclear power plant; questionnaire-based healthcare application development; sofware safety standards; video conferencing system; WebRTC; NoSQL databases; cloud computing; security management; authentication system; dynamic biometric features; reversible data hiding method; exclusive-or; software maintenance; pattern-based software development; interactive software; and service-oriented architecture.
Keywords :
SQL; biometrics (access control); business data processing; cloud computing; data encapsulation; data flow analysis; health care; interactive systems; mobile computing; nuclear power stations; object-oriented programming; quality of service; security of data; service-oriented architecture; software maintenance; software standards; source code (software); teleconferencing; video communication; NoSQL databases; PaaS cloud providers; WebRTC; authentication system; dynamic biometric features; enterprise cloud computing; exclusive-or; interactive software; mobile application malicious behavior detection; nuclear power plant; pattern-based software development; quality of service; questionnaire-based healthcare application development; reversible data hiding method; safety risk assessment; security management; security risk assessment; service-oriented architecture; software maintenance; sofware safety standards; source code data flow; video conferencing system;
Conference_Titel :
Trustworthy Systems and their Applications (TSA), 2014 International Conference on
Conference_Location :
Taichung
Print_ISBN :
978-1-4799-6565-6