Skip to main content
Log in

A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As web applications are a type of software for providing web services, its development and operation essentially depend on a software development life cycle (SDLC). However, because it is difficult to ensure the safety in web applications by outsourcing that evade the management based on SDLC, there is a high possibility of using it as a path of cyber attacks. Thus, in this study a web application acquisition procedure for outsourcing that can provide safe web services by strengthening security and makes possible to efficiently manage software by outsourcing from the plan for web applications by outsourcing to its disposal is proposed. The proposed method extends a procedure on security viewpoint that web applications by outsourcing and simply tests whether or not there exists a possibility of hacking in a security perspective. Also, it shows an advantage of providing more safe web services through preparing new threats in web applications without exposing internal service system structures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Zhang, J., & Chung, J. Y. (2006). An open framework supporting multimedia web services. Multimedia Tools and Applications, 30(2), 149–164.

    Article  Google Scholar 

  2. Katsionis, G., & Virvou, M. (2008). Personalised e-learning throught an educational virtual reality game using Web services. Multimedia Tools and Applications, 39(1), 47–71.

    Article  Google Scholar 

  3. Kumar, R. (2011). Fifth generation networking principles for a service driven future internet architecture. Wireless Personal Communications, 57, 393–411.

    Article  Google Scholar 

  4. Ford, R. (2004). Googling for gold: Web crawlers, hacking and defense explained. Network Security, 2004(1), 10–13.

    Article  Google Scholar 

  5. Forte, D. (2010). Preventing and investigating hacking by auditing web applications. Network Security, 2010(2), 18–20.

    Article  Google Scholar 

  6. Amlani, R. D. (2013). Comparision of different SDLC models. International Journal of Computer Applications and Information Technology, 2(1), 4–8.

    Google Scholar 

  7. Lai, W. H., & Tsen, H. C. (2013). Exploring the relationship between system development life cycle and knowledge accumulation in Taiwan’s IT industry. Expert Systems, 30(2), 173–182.

    Article  Google Scholar 

  8. Pollard, C. E., Gupta, D., & Satzinger, J. W. (2010). Teaching systems development: A compelling case for integrating the SDLC with the ITSM lifecycle. Information Systems Management, 27(2), 113–122.

    Article  Google Scholar 

  9. http://en.wikipedia.org/wiki/Software_Development_Life_Cycle.

  10. Danahy, J. (2008). The ‘phasing-in’ of security governance in the SDLC. Network Security, 2008(12), 15–17.

    Article  Google Scholar 

  11. http://www.microsoft.com/security/sdl/default.aspx.

  12. http://en.wikipedia.org/wiki/Software_testing.

  13. Rana, K. K., & Ahmad, S. S. U. (2005). Bringing maturity to test. Electronics Systems and Software, 3(2), 32–35.

    Article  Google Scholar 

  14. Le, M., Stavrou, A., & Kang, B. B. H. (2012). DoubleGuard: Detecting intrusions in multitier web applications. IEEE Transactions on Dependable and Secure Computing, 9(4), 512–525.

    Article  Google Scholar 

  15. Zhang, J. (2011). A mobile agent-based tool supporting web services testing. Wireless Personal Communications, 56, 147–172.

    Article  Google Scholar 

  16. Kim, M. S., Lee, D. H., & Kim, J. K. N. (2013). A study on convergence security system for preventing leakage of internal information. Wireless Personal Communications, 73, 175–185.

    Article  Google Scholar 

  17. Choi, K. H., & Lee, D. H. (2015). A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention. Multimedia Tools and Applications, 74(20), 8927–8937.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuinam J. Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, KH., Kim, K.J. A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service. Wireless Pers Commun 94, 5–16 (2017). https://doi.org/10.1007/s11277-015-3153-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3153-0

Keywords

Navigation