COSTECH Integrated Repository

On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications

Show simple item record

dc.creator Nyambo, Devotha
dc.creator Yonah, Zaipuna
dc.creator Tarimo, Charles
dc.date 2019-05-22T05:44:15Z
dc.date 2019-05-22T05:44:15Z
dc.date 2016-01-01
dc.date.accessioned 2022-10-25T09:15:48Z
dc.date.available 2022-10-25T09:15:48Z
dc.identifier 2210-142X
dc.identifier http://dx.doi.org/10.12785/ijcds/050105
dc.identifier http://dspace.nm-aist.ac.tz/handle/123456789/128
dc.identifier.uri http://hdl.handle.net/123456789/94623
dc.description Research Article published by International Journal of Computing and Digital Systems
dc.description Contemporary development of information systems for service delivery is at the present a matter of bringing together use of web and mobile applications. However, this advancement in the field of computing is happening at the expense of increased security risks to the system users and owners. This is due to the fact that the advancement in systems security controls is not taking place at the same pace. In the converged web and mobile applications, developers lack formal development standards for security design and verification. As a result, applications are built with ad hoc implementations of security controls depending on context of usage. In view of the above, this paper attempts to put forward a possible set of security controls considered to be suitable for addressing the security demands in converged web and mobile applications environments. To achieve this objective, use is made of a Livestock Data Center (LDC) system as a case study for analysis and reasoning. By design, the system can be accessed through web and mobile applications. The overall process involved here had the following phases: the first phase involved reviewing existing security controls and assessment of their usage in the converged web and mobile applications. The output from this stage was a review of security controls assessment report. The second phase involved devising and proposing a possible, security assessment model for the converged web and mobile applications. The last phase of this process, involved employing the proposed security controls assessment model and the case study to identify the possible security controls suitable for the converged web and mobile applications. The approach used for security controls assessment involved a combination of white box and black box techniques. Whereas the platforms used for Web and mobile applications development were PHP and Java, respectively. This last item has been done to practically assess the security controls at an application level, and consequently to come up with suitable controls for the same.
dc.format application/pdf
dc.language en_US
dc.publisher International Journal of Computing and Digital Systems
dc.subject converged web and mobile applications
dc.subject security controls
dc.subject application level security
dc.title On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications
dc.type Article


Files in this item

Files Size Format View
JA_ICSE_2016.pdf 1.231Mb application/pdf View/Open

This item appears in the following Collection(s)

Show simple item record

Search COSTECH


Advanced Search

Browse

My Account