Skip to main content
Top
Published in: Wireless Personal Communications 1/2018

28-02-2018

Research on Credible Demand Analysis Method Based on Risk Driven Mobile Application Software

Authors: Xuejun Yu, Dan Feng

Published in: Wireless Personal Communications | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of mobile Internet, its content and applications are becoming more and more abundant, and android system occupies an important share of the mobile application software market. Due to Android’s own openness, more and more malicious software and imitative software have appeared, and users are also facing more and more risks in operating the software. Therefore, the credibility of the mobile application becomes a pivotal measure of its quality . Credible demand analysis analysis is one of the key steps in the process of software construction. This paper presents a credible demand analysis method driven based on risk driven.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Yuelin, C. (2016). Research and application of reliability test of mobile application based on behavior declaration. Beijing University of Technology, 2016. Yuelin, C. (2016). Research and application of reliability test of mobile application based on behavior declaration. Beijing University of Technology, 2016.
4.
go back to reference Arzt, S., Rasthofer, S., Fritz, C., et al. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices, 49(6), 259–269.CrossRef Arzt, S., Rasthofer, S., Fritz, C., et al. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices, 49(6), 259–269.CrossRef
5.
go back to reference Gao, C. (2014). The research and application of credibility measurement model based on software behavior. Beijing university of technology, 2014. Gao, C. (2014). The research and application of credibility measurement model based on software behavior. Beijing university of technology, 2014.
6.
go back to reference Lenzini, G., & Tokmakoff, A. (2007). Managing trustworthiness in component based embedded systems. Electronic Notes in Theoretical Computer Science, 179, 143–155.CrossRef Lenzini, G., & Tokmakoff, A. (2007). Managing trustworthiness in component based embedded systems. Electronic Notes in Theoretical Computer Science, 179, 143–155.CrossRef
7.
go back to reference Chen, Y. (2005). Research on requirements prioritization management of trustworthy software product. In The 2nd international conference on e-business and e-government (EI:20112914160478), 2011,5. Chen, Y. (2005). Research on requirements prioritization management of trustworthy software product. In The 2nd international conference on e-business and e-government (EI:20112914160478), 2011,5.
8.
go back to reference Li, W., Dai, Y.-X., & Lian, Y.-F. (2009). Context sensitive host-based IDS using hybrid automaton. Journal of Software, 20, 138–151.CrossRef Li, W., Dai, Y.-X., & Lian, Y.-F. (2009). Context sensitive host-based IDS using hybrid automaton. Journal of Software, 20, 138–151.CrossRef
Metadata
Title
Research on Credible Demand Analysis Method Based on Risk Driven Mobile Application Software
Authors
Xuejun Yu
Dan Feng
Publication date
28-02-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5477-z

Other articles of this Issue 1/2018

Wireless Personal Communications 1/2018 Go to the issue