COSTECH Integrated Repository

An Approach for Systematically Analyzing and Specifying Security Requirements for the Converged Web-Mobile Applications

Show simple item record

dc.creator Nyambo, Devotha
dc.creator Yonah, Zaipuna
dc.creator Tarimo, Charles
dc.date 2019-05-22T05:37:19Z
dc.date 2019-05-22T05:37:19Z
dc.date 2014-09-01
dc.date.accessioned 2022-10-25T09:15:53Z
dc.date.available 2022-10-25T09:15:53Z
dc.identifier 2210-142X
dc.identifier http://dspace.nm-aist.ac.tz/handle/123456789/127
dc.identifier.uri http://hdl.handle.net/123456789/94665
dc.description Research Article published by Scientific Publishing Center
dc.description As the use of web and mobile applications is becoming pervasive for service delivery and user mobility support, enterprises are now increasingly fighting against a huge number of emerging security threats which interfere with the process of service delivery. As an attempt to help the enterprises in dealing with the emerging security threats in the converged service delivery architecture, this paper presents a methodology for security threat analysis and security requirements specification in web/mobile applications development. The presented methodology is based on a case study Livestock Data Center (LDC) system, which is being developed and it allows both web and mobile interfaces as service delivery channels. Hence the system serves as a representative of other similar setups of service delivery. In addition to the processes of analysis and security specification, the methodology involves threat modeling as well. There are several threat models in the literature. The STRIDE threats model is one among the existing threats models that is used to identify security threats that needs to be addressed in systems such as the LDC system. The STRIDE threats model has been used to identify the likely security threats to our case study. On applying the STRIDE threats model the following threats were identified as prominent: sensitive data exposure, weak server side controls, client side injection, and weak authentication and authorization. The identified security threats were compared to existing threats in traditional web and mobile applications separately in order to figure out the changes when the two computing platforms come together. The findings from our case study have shown that the proposed methodology for security threat analysis and security design can be useful in security requirements specifications in the converged web-mobile applications during development, and can be generally used to assist developers of other similar systems.
dc.format application/pdf
dc.language en_US
dc.publisher Scientific Publishing Center
dc.subject web and mobile applications security
dc.subject Livestock Data Center
dc.subject security requirements
dc.title An Approach for Systematically Analyzing and Specifying Security Requirements for the Converged Web-Mobile Applications
dc.type Article


Files in this item

Files Size Format View
JA_ICSE_2014.pdf 883.1Kb application/pdf View/Open

This item appears in the following Collection(s)

Show simple item record

Search COSTECH


Advanced Search

Browse

My Account