Skip to main content

2021 | OriginalPaper | Buchkapitel

Specialized Applications Used in the Mobile Application Security Implementation Process

verfasst von : Marian Pompiliu Cristescu, Julian Andreev Vasilev

Erschienen in: Organizations and Performance in a Complex World

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104. Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104.
Zurück zum Zitat Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328. Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328.
Zurück zum Zitat Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.CrossRef Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.CrossRef
Zurück zum Zitat Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4. Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4.
Zurück zum Zitat Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149. Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149.
Zurück zum Zitat Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9. Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9.
Zurück zum Zitat Patriciu, V., Ene-Pietroşanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice şi securitate informatică, Aspecte criptografice, tehnice, juridice şi de standardizare. Bucureşti: BIC ALL. ISBN 973-571-564-3. Patriciu, V., Ene-Pietroşanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice şi securitate informatică, Aspecte criptografice, tehnice, juridice şi de standardizare. Bucureşti: BIC ALL. ISBN 973-571-564-3.
Zurück zum Zitat Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006. Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006.
Zurück zum Zitat Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.CrossRef Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.CrossRef
Zurück zum Zitat Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206. Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206.
Zurück zum Zitat Vişoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166. Vişoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166.
Metadaten
Titel
Specialized Applications Used in the Mobile Application Security Implementation Process
verfasst von
Marian Pompiliu Cristescu
Julian Andreev Vasilev
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-50676-6_4

Premium Partner