Skip to main content
Top

2021 | OriginalPaper | Chapter

Specialized Applications Used in the Mobile Application Security Implementation Process

Authors : Marian Pompiliu Cristescu, Julian Andreev Vasilev

Published in: Organizations and Performance in a Complex World

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104. Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104.
go back to reference Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328. Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328.
go back to reference Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.CrossRef Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.CrossRef
go back to reference Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4. Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4.
go back to reference Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149. Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149.
go back to reference Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9. Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9.
go back to reference Patriciu, V., Ene-Pietroşanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice şi securitate informatică, Aspecte criptografice, tehnice, juridice şi de standardizare. Bucureşti: BIC ALL. ISBN 973-571-564-3. Patriciu, V., Ene-Pietroşanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice şi securitate informatică, Aspecte criptografice, tehnice, juridice şi de standardizare. Bucureşti: BIC ALL. ISBN 973-571-564-3.
go back to reference Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006. Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006.
go back to reference Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.CrossRef Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.CrossRef
go back to reference Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206. Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206.
go back to reference Vişoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166. Vişoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166.
Metadata
Title
Specialized Applications Used in the Mobile Application Security Implementation Process
Authors
Marian Pompiliu Cristescu
Julian Andreev Vasilev
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-50676-6_4