Skip to main content

Specialized Applications Used in the Mobile Application Security Implementation Process

  • Conference paper
  • First Online:
Organizations and Performance in a Complex World (IECS 2019)

Part of the book series: Springer Proceedings in Business and Economics ((SPBE))

Included in the following conference series:

Abstract

In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104.

    Google Scholar 

  • Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328.

    Google Scholar 

  • Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.

    Book  Google Scholar 

  • Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4.

    Google Scholar 

  • Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149.

    Google Scholar 

  • ISO 9126. (2011). International Standardization Organization: Software quality assurance, Retrieved 2019, January 15, from http://www.issco.unige.ch/en/research/projects/ewg95//node14.html and http://www.sqa.net/iso9126.html.

  • Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9.

    Google Scholar 

  • Microsoft. (2012a). Cryptography overview. Retrieved 2018, December 11, from http://msdn.microsoft.com/en-us/library/92f9ye3s(v=VS.90).aspx

  • Microsoft. (2012b). Cryptographic services. Retrieved 2018, December 11, from http://msdn.microsoft.com/en-us/library/92f9ye3s.aspx

  • Patriciu, V., Ene-PietroÅŸanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice ÅŸi securitate informatică, Aspecte criptografice, tehnice, juridice ÅŸi de standardizare. BucureÅŸti: BIC ALL. ISBN 973-571-564-3.

    Google Scholar 

  • Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006.

    Google Scholar 

  • Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.

    Book  Google Scholar 

  • Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206.

    Google Scholar 

  • Van Ham G. (2003). LightCrypto. Retrieved 2018, December 11, from http://jcetaglib.sourceforge.net/lightcrypto/

  • ViÅŸoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marian Pompiliu Cristescu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cristescu, M.P., Vasilev, J.A. (2021). Specialized Applications Used in the Mobile Application Security Implementation Process. In: Orăștean, R., Ogrean, C., Mărginean, S.C. (eds) Organizations and Performance in a Complex World. IECS 2019. Springer Proceedings in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-030-50676-6_4

Download citation

Publish with us

Policies and ethics