Show simple item record

dc.contributor.authorNyambo, Devotha
dc.contributor.authorYonah, Zaipuna
dc.contributor.authorTarimo, Charles
dc.date.accessioned2019-05-22T05:37:19Z
dc.date.available2019-05-22T05:37:19Z
dc.date.issued2014-09-01
dc.identifier.issn2210-142X
dc.identifier.urihttp://dspace.nm-aist.ac.tz/handle/123456789/127
dc.descriptionResearch Article published by Scientific Publishing Centeren_US
dc.description.abstractAs the use of web and mobile applications is becoming pervasive for service delivery and user mobility support, enterprises are now increasingly fighting against a huge number of emerging security threats which interfere with the process of service delivery. As an attempt to help the enterprises in dealing with the emerging security threats in the converged service delivery architecture, this paper presents a methodology for security threat analysis and security requirements specification in web/mobile applications development. The presented methodology is based on a case study Livestock Data Center (LDC) system, which is being developed and it allows both web and mobile interfaces as service delivery channels. Hence the system serves as a representative of other similar setups of service delivery. In addition to the processes of analysis and security specification, the methodology involves threat modeling as well. There are several threat models in the literature. The STRIDE threats model is one among the existing threats models that is used to identify security threats that needs to be addressed in systems such as the LDC system. The STRIDE threats model has been used to identify the likely security threats to our case study. On applying the STRIDE threats model the following threats were identified as prominent: sensitive data exposure, weak server side controls, client side injection, and weak authentication and authorization. The identified security threats were compared to existing threats in traditional web and mobile applications separately in order to figure out the changes when the two computing platforms come together. The findings from our case study have shown that the proposed methodology for security threat analysis and security design can be useful in security requirements specifications in the converged web-mobile applications during development, and can be generally used to assist developers of other similar systems.en_US
dc.language.isoen_USen_US
dc.publisherScientific Publishing Centeren_US
dc.subjectweb and mobile applications securityen_US
dc.subjectLivestock Data Centeren_US
dc.subjectsecurity requirementsen_US
dc.titleAn Approach for Systematically Analyzing and Specifying Security Requirements for the Converged Web-Mobile Applicationsen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record