University of Bahrain
Scientific Journals

On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications

Show simple item record

dc.contributor.author Nyambo,Devotha
dc.contributor.author Yonah, Zaipuna
dc.contributor.author Tarimo,Charles
dc.date.accessioned 2018-07-24T09:51:11Z
dc.date.available 2018-07-24T09:51:11Z
dc.date.issued 2016
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/618
dc.description.abstract Contemporary development of information systems for service delivery is at the present a matter of bringing together use of web and mobile applications. However, this advancement in the field of computing is happening at the expense of increased security risks to the system users and owners. This is due to the fact that the advancement in systems security controls is not taking place at the same pace. In the converged web and mobile applications, developers lack formal development standards for security design and verification. As a result, applications are built with ad hoc implementations of security controls depending on context of usage. In view of the above, this paper attempts to put forward a possible set of security controls considered to be suitable for addressing the security demands in converged web and mobile applications environments. To achieve this objective, use is made of a Livestock Data Center (LDC) system as a case study for analysis and reasoning. By design, the system can be accessed through web and mobile applications. The overall process involved here had the following phases: the first phase involved reviewing existing security controls and assessment of their usage in the converged web and mobile applications. The output from this stage was a review of security controls assessment report. The second phase involved devising and proposing a possible, security assessment model for the converged web and mobile applications. The last phase of this process, involved employing the proposed security controls assessment model and the case study to identify the possible security controls suitable for the converged web and mobile applications. The approach used for security controls assessment involved a combination of white box and black box techniques. Whereas the platforms used for Web and mobile applications development were PHP and Java, respectively. This last item has been done to practically assess the security controls at an application level, and consequently to come up with suitable controls for the same. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-ShareAlike 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-sa/4.0/ *
dc.subject converged web and mobile applications en_US
dc.subject security controls en_US
dc.subject application level security en_US
dc.title On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/IJCDS/050105
dc.volume 05
dc.issue 01
dc.source.title International Journal of Computing and Digital Systems
dc.abbreviatedsourcetitle IJCDS


Files in this item

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-ShareAlike 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 4.0 International

All Journals


Advanced Search

Browse

Administrator Account