Publications
[Journal]
2023 - Shi-Cho Cha, Weizhi Meng, Wen-Wei Li, and Kuo-Hui Yeh, " A Blockchain-enabled IoT Auditing Management System Complying with ISO/IEC 15408-2," Computers & Industrial Engineering, Volume 178, 2023, https://doi.org/10.1016/j.cie.2023.109091.
2023 - Wen-Wei Li, Weizhi Meng, Kuo-Hui Yeh, and Shi-Cho Cha*, " Trusting Computing as a Service for Blockchain Applications," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2023.3242464. (SCI-E)
2022 - Shi-Cho Cha, Ming-Shiung Chuang, Wen-Wei Li, Chun-Neng Peng, Yi-Hsuan Hung, Kuo-Hui Yeh, "Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications," Computers, Materials & Continua 2022, 73(2), 2731-2755. (SCI-E)
2021 - S. -C. Cha, C. -L. Chang, Y. Xiang, Z. -J. Huang and K. -H. Yeh, "Enhancing OAuth with Blockchain Technologies for Data Portability," in IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 349-366, 1 Jan.-March 2023, doi: 10.1109/TCC.2021.3094846. (SCI-E)
2020 - Shi-Cho Cha, Kuo-Hui Yeh, and Zi-Jia Huang, "bleRPC: A plug-and-play RPC framework over BLE," Computer Communications, Volume 157, 2020, Pages 298-307. (SCI-E).
2020 - S. -C. Cha, H. Wang, Z. Tan, Y. -J. Joung, Y. -C. Tseng and K. -H. Yeh, "On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 4, no. 5, pp. 641-652, Oct. 2020 (SCI-E).
2019 - S. Cha, T. Hsu, Y. Xiang and K. Yeh, "Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2159-2187, April 2019. (SCI-E)
2018 - S. Cha, J. Chen, C. Su and K. Yeh, "A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things," in IEEE Access, vol. 6, pp. 24639-24649, 2018. (SCI-E)
2018 - S. Cha, M. Chuang, K. Yeh, Z. Huang and C. Su, "A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices," in IEEE Access, vol. 6, pp. 20779-20787, 2018. (SCI-E)
2018 - S. Cha and K. Yeh, "A Data-Driven Security Risk Assessment Scheme for Personal Data Protection," in IEEE Access, vol. 6, pp. 50510-50517, 2018.
2017 - S. Cha, K. Yeh, and J. Chen, "Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things," Sensors 2017, 17, 2348 (SCI-E).
2012 - Shi-Cho Cha, Ya-Ping Fu, Ren-Ting Ku and Hao-Ping Lin, "On Considering Enforcement While Establishing RFID Privacy Policies", Int. J. Information Privacy, Security and Integrity, Vol. 1, N 2/3, Page(s) 234-252, 2012.
2012 - Shi-Cho Cha and Hsiang-Meng Chang, "Efficient Consistency Achievement of Federated Identity and Access Management based on a Novel Self-Adaptable Approach", IEICE Transactions on Information and Systems, Vol.E95-D, No.2, Page(s): 577-587, Feb. 2012 (SCI-E).
2011 - John S. Liu, Chung-Huei Kuan, Shi-Cho Cha, Wen-Ling Chuang, George J. Gau, and Jeng-Ywan Jeng, "Photovoltaic Technology Development: A Perspective from Patent Growth Analysis", Solar Energy Materials & Solar Cells, Volume 95, 2011, pp. 3130–3136. (SCI).
2010 - Shi-Cho Cha, "Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy," IEICE Transactions on Information and Systems, Vol.E93-D, No.7, Page(s) 1866-1877, Jul 2010. (SCI-E)
2009 - Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen, "Duplicate Work Reduction in Business Continuity and Risk Management Processes", Security Informatics – Annals of Information Systems Vol. 9, Springer-Verlag, Page(s): 155-170, 2009.
[Conference]
2022 - Shi-Cho Cha, Yi-Hsuan Hsuan, Kuo-Hui Yeh, Takeshi Ishihara, Ohba Yoshihiro, and Wei-Nin Chen, "An Evolutionary Risk-based Access Control Framework for Enterprise File Systems," IEEE WF-IoT 2022, Yokohama, Japan.
2019 - S. Cha, Z. Li, C. Fan, M. Tsai, J. Li and T. Huang, "On Design and Implementation a Federated Chat Service Framework in Social Network Applications," 2019 IEEE International Conference on Agents (ICA), 2019, pp. 33-36.
2018 - Shi-Cho Cha, Wei-Ching Peng, Tzu-Yang Hsu, Chu-Lin Chang, and Shang-Wei Li, "A Blockchain-based Privacy Preserving Ticketing Service," in Proceedings of the 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), Nara, 2018, pp. 1-3..
2018 - S. Cha and K. Yeh, "An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology," 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, 2018, pp. 1-2.
2017 - S. Cha, T. Tsai, W. Peng, T. Huang and T. Hsu, "Privacy-aware and blockchain connected gateways for users to access legacy IoT devices," in Proceeding of the 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), Nagoya, 2017, pp. 1-3.
2017 - Shi-Cho Cha, Wei-Ching Peng, Zi-Jia Huang, Tzu-Yang Hsu, Jyun-Fu Chen, and Tsung-Ying Tsai, "On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications", In Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August, 12-15, 2017, Matsue, Shimane, Japan, Part II.
2016 - S. Cha, C. Dai and J. Chen, "Is there a tradeoff between privacy and security in BLE-based IoT applications: Using a smart vehicle of a major Taiwanese brand as example," 2016 IEEE 5th Global Conference on Consumer Electronics, Kyoto, 2016, pp. 1-4.
2016 - Shi-Cho Cha, Shih-Cheng Hung, Jyun-Fu Chen, Sih-Cing Syu, and Tsung-Ying Tsai, "On the design of a blockchain-based reputation service for android applications", In Proceedings of the 2016 International Conference on Cyber-Society and Smart Computing Communication (The CyberSoc 2016), 2016. Yogyakarta, Indonesia.
2016 - Shi-Cho Cha, Ming-Shiung Chuang, Tzu-Ching Liu, Sih-Cing Syu, Li-Da Chien, Sih-Cing Syu, and Daniel Tsai, "A novel framework for major stakeholders in android application industry to manage privacy policies of android applications", In Proceedings of the Annual Privacy Forum 2016, Frankfurt, Germany, September 7-8, 2016.
2015 - Shi-Cho Cha, Yu-Shiuan Tsai, Shao-Kang Lu, Tzu-Ching Liu, Pei-Shan Chung, Chen-Fang Wang, and Chao-Yang Hsu, "PathDrawoid: a Sensitive Data Flow Dynamic Analysis Platform for Android Applications (PathDrawoid: 能呈現 Android 應用程式敏感資料流向的動態分析平台)," In Proceeding of the CISC 2015. (In Traditional Chinese)
2014 - S. Cha, Y. Joung, Y. Tseng, S. Huang, G. Chen and C. Tseng, "Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices," 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Las Vegas, NV, 2014, pp. 1-6.
2014 - Shi-Cho Cha, Jyun-Fu Chen, and Chih-Teng Tseng, "On Privacy-Preserving E-Invoicing in Physical Channels via NFC", In Proceedings of the RFIDSec Asia 2014.
2014 - Y. Joung, Y. Tseng, S. Cha, N. Lo, G. Chung and C. Liu, "Motivations, Deployment, and Assessment of Taiwan's E-Invoicing System: An Overview," 2014 47th Hawaii International Conference on System Sciences, 2014, pp. 2200-2209
2012 - Shi-Cho Cha, Jyun-Fu Chen, Shih-Chieh Huang, Chih-Teng Tseng, and Wei-Kai Chen, "On Design of Secure APIs for IoT Applications – Using Taiwan Uniform e-Invoices as Examples," IoS Press, Cryptology and Information Security Series, Volume 8: Radio Frequency Identification System Security, pp. 9-20, 2012.
2010 - Shi-Cho Cha, Ren-Ting Ku, Ya-Ping Fu, Hao-Ping Lin, "On Generating RFID Privacy Policies in Consideration of Openness and Enforcement", In Proceedings of the IEEE SocialCom/PASSAT 2010, Minneapolis, Minnesota, USA, Page(s) 897-905.
2009 - Shi-Cho Cha, Li-Ting Liu, and Bo-Chen Yu, "Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk," In Proceedings of International Conference on IEEE Computational Science and Engineering, Volume 3, 29-31 Aug. 2009 Page(s):379 – 385, Vancouver, Canada.
2008 - Shi-Cho Cha, Hua-Peng Lin, and Hsiang-Meng Chang, “A Self-Adaptive Framework to Achieve Strong Consistency in Federated Identity and Access Management System, " In Proceedings of the International Conference on the Latest Advances in Networks( ICLAN) 2008, 10-12 Dec, 2008, Toulouse, France, Page(s):69- 74.
2008 - Shi-Cho Cha*, Kuan-Ju Huang, and Hsiang-Meng Chang, "An Efficient and Flexible Way to Protect Privacy in RFID Environment with Licenses, " In Proceedings of 2008 IEEE International Conference on RFID, Las Vegas, Nevada, 16-17 April 2008, Page(s):35 – 42.
2008 - Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen, "RiskPatrol: A risk management system considering the integration risk management with business continuity processes, " In Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI 2008), 17-20 June 2008 Page(s):110 – 115.
2007 - Shi-Cho Cha, Ming-Guo Wang, Hua-Peng Lin, and Jyun-Wun Huang, "FEDERACY: An Extensible Federated Identity and Access Management Framework Considering Legacy Systems," In Proceedings of the Communication, Network, and Information Security (CNIS 2007), Berkeley, California, USA, 2007.
2007 - Shi-Cho Cha, Hua-Peng Lin, Ming-Guo Wang, and Jyun-Wun Huang, "XPIPAL: A Markup Language to Realize Federated Identity Management," In Proceedings of the ICITST 2007, London, UK, Page(s) 61-68, 2007。
2005 - Shi-Cho Cha, Hung-Wen Tung, Han-Chao Lee, Tse-Ming Tsai, Raymund Lin, and Chih-Hao Hsu, "Take Risks into Consideration while Job Dispatching, " IFIP International Federation for Information Processing, Volumn 191, 2005, ISBN: 0-387-29551-8, pp. 1-14, Springer Verlag
2005 - Shi-Cho Cha, Hung-Wen Tung, Han-Chao Lee, Tse-Ming Tsai, Raymund Lin, and Chih-Hao Hsu, "Robalo: A Risk-Oriented Job Dispatching Mechanism for Workforce Management System," IFIP International Federation for Information Processing, Volume 189, 2005, ISBN: 0-387-28753-1, pp. 559-570, Springer Verlag.
2005 - Shi-Cho Cha and Yuh-Jzer Joung, "On Derived Data Service in the Cyberspace", In Proceedings of the 2005 Symposium on Applications and the Internet, 2005, Page(s):406 – 412.
2004 - Shi-Cho Cha, Yuh-Jzer Joung and Yu-En Lue, "Providing a Passport-like service over an Agent-based Peer-to-Peer Network," Lector Notes in Computer Science 2872, 2004, Page(s) 41-46, Springer Verlag. (SCI-E)
2003 - Shi-Cho Cha and Yuh-Jzer Joung, "From P3P to Data Licenses, " Lector Notes in Computer Science 2760, 2003, Page(s) 205-221, Dresden, Germany. (SCI-E)
2003 - Shi-Cho Cha, Yuh-Jzer Joung and Yu-En Lue, "Building Universal Profile Systems over Peer-to-Peer Network", In Proceedings of the IEEE WIAPP 2003, 2003.
2002 - Shi-Cho Cha and Yuh-Jzer Joung, "Online Personal Data Licensing", In Proceedings of the LawTech 2002, Cambridge, Boston, USA, Page(s) 28-33, 2002.
2001 - Shi-Cho Cha and Yuh-Jzer Joung, "Managing Personal Data in the Age of Customization Services," In Proceedings of the IACIS2001, 2001, Vancouver, Canada.
[Book]
Shi-Cho Cha, Practices of Web Appliation Security Inspection Processes (網站應用程式安全檢測流程建置實務), Chuan Hwa Book Co. 2012, ISBN 9789574188895. (In Traditional Chinese)
[Book Chapter]
Yuh-Jzer Joung and Shi-Cho Cha, "Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace," Intellectual Property Protection for Multimedia Information Technology, Dec, 2007, Page(s): 162-185.