An Approach for Systematically Analyzing and Specifying Security Requirements for the Converged Web-Mobile Applications
وكيل مرتبط
Yonah, Zaipuna, مؤلف مشارك
Tarimo, Charles, مؤلف مشارك
دولة النشر
Kingdom of Bahrain
مكان النشر
Sakhir, Bahrain
الناشر
University of Bahrain
تاريخ النشر
2014
اللغة
الأنجليزية
الملخص الإنجليزي
Abstract :
As the use of web and mobile applications is becoming pervasive for service delivery and user mobility support, enterprises are now increasingly fighting against a huge number of emerging security threats which interfere with the process of service delivery. As an attempt to help the enterprises in dealing with the emerging security threats in the converged service delivery architecture, this paper presents a methodology for security threat analysis and security requirements specification in web/mobile applications development. The presented methodology is based on a case study Livestock Data Center (LDC) system, which is being developed and it allows both web and mobile interfaces as service delivery channels. Hence the system serves as a representative of other similar setups of service delivery. In addition to the processes of analysis and security specification, the methodology involves threat modeling as well. There are several threat models in the literature. The STRIDE threats model is one among the existing threats models that is used to identify security threats that needs to be addressed in systems such as the LDC system. The STRIDE threats model has been used to identify the likely security threats to our case study. On applying the STRIDE threats model the following threats were identified as prominent: sensitive data exposure, weak server side controls, client side injection, and weak authentication and authorization. The identified security threats were compared to existing threats in traditional web and mobile applications separately in order to figure out the changes when the two computing platforms come together. The findings from our case study have shown that the proposed methodology for security threat analysis and security design can be useful in security requirements specifications in the converged web-mobile applications during development, and can be generally used to assist developers of other similar systems.
Keywords: web and mobile applications security, STRIDE, Livestock Data Center, security requirements
المجموعة
المعرف
https://digitalrepository.uob.edu.bh/id/25cc8a9d-353d-4285-acb0-d975c048af86
https://digitalrepository.uob.edu.bh/id/25cc8a9d-353d-4285-acb0-d975c048af86