Abstract
In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ambler, S., & Lines, M. (2012). Disciplined agile delivery: A practitioner’s guide to agile software delivery, in the enterprise. Indianapolis, IN: IBM Press. ISBN 0132810107, 9780132810104.
Barnes J. (2007). Implementing the IBM Rational Unified Process and Solutions: A Guide to Improving Your Software Development Capability and Maturity (Pearson Education, p. 216). Upper Saddle River, NJ: IBM Press. ISBN 0132704323, 9780132704328.
Bulusu, L. (2012). Open source data warehousing and business intelligence. An Auerbach book (p. 432). Boca Raton, FL: CRC Press. ISBN 1439816409, 9781439816400.
Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York: McGraw Hill Professional. ISBN:987-0-07-163357-4.
Harkins M. (2012). Expert’s voice in information technology (p. 152). SpringerLink: Bücher, Apress. ISBN 143025114X, 9781430251149.
ISO 9126. (2011). International Standardization Organization: Software quality assurance, Retrieved 2019, January 15, from http://www.issco.unige.ch/en/research/projects/ewg95//node14.html and http://www.sqa.net/iso9126.html.
Kabasele Tenday, J. M. (2010). Using special use cases for security in the software development life cycle. In Proceeding WISA’10 Proceedings of the 11th international conference on Information security applications (pp. 122–134) ISBN:3-642-17954-1 978-3-642-17954-9.
Microsoft. (2012a). Cryptography overview. Retrieved 2018, December 11, from http://msdn.microsoft.com/en-us/library/92f9ye3s(v=VS.90).aspx
Microsoft. (2012b). Cryptographic services. Retrieved 2018, December 11, from http://msdn.microsoft.com/en-us/library/92f9ye3s.aspx
Patriciu, V., Ene-Pietroşanu, M., Bica, I., & Priescu, I. (2006). Semnături electronice şi securitate informatică, Aspecte criptografice, tehnice, juridice şi de standardizare. Bucureşti: BIC ALL. ISBN 973-571-564-3.
Pocatilu P. (2006). Influencing factors of mobile application’s quality metrics, Economy Informatics Journal, No. 1–4, pp. 102–104, INFOREC Publishing House, ISSN 1582-7941, EISSN 2247-8523, Bucharest, 2006.
Runeson, P., Host, M., Rainer, A., & Regnell, B. (2012). Case study research in software engineering: Guidelines and examples (p. 256). Hoboken, NJ: Wiley. ISBN 111818100X, 9781118181003.
Terpeluk, M. L., & Atre, S. (2003). Business intelligence roadmap: The complete project lifecycle for decision-support applications. Boston, MA: Addison-Wesley Professional. ISBN 0201784203, 9780201784206.
Van Ham G. (2003). LightCrypto. Retrieved 2018, December 11, from http://jcetaglib.sourceforge.net/lightcrypto/
Vişoiu, A., & Trif, S. (2010). Open source security components for mobile applications. Open Source Science Journal, 2(2), 155–166. ISSN 2066-740X, 155-166.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cristescu, M.P., Vasilev, J.A. (2021). Specialized Applications Used in the Mobile Application Security Implementation Process. In: Orăștean, R., Ogrean, C., Mărginean, S.C. (eds) Organizations and Performance in a Complex World. IECS 2019. Springer Proceedings in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-030-50676-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-50676-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50675-9
Online ISBN: 978-3-030-50676-6
eBook Packages: Business and ManagementBusiness and Management (R0)