ABSTRACT
Security1 design of mobile apps is very important, and it is also important that researchers consider and disseminate the continually changing requirements. For mobile application i.e. a software program that runs on a mobile phone, its design, development and management need to consider security impact. In particular, because of mobile app is running on online devices, cyber security defense is required. In this chapter, mobile app security is discussed from the initial planning and design stage to its maintenance after its launch.
- Antoine Olivier, et al 2013. ISO/IEC 27018: The Future Standard for Personal Data Protection in Public Cloud, EBRC.Google Scholar
- Feng, X. and Zhang X. 2015. Personally Identifiable Information Security in Cloud Computing. International Conference on Computing and Technology Innovation, UK.Google Scholar
- ICO. 2016. Overview of the General Data Protection Regulation (GDPR). https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/ (Accessed 14/3/2017)Google Scholar
- Anderson R., 2008. Security Engineering. 2nd Ed. Wiley, UK ISBN-10: 0470068523, ISBN-13: 978-0470068526.Google Scholar
- Feng, X, and Conrad M. 2017. Security at the Design Stage. Accepted by ACE-2017, FL. USA.Google Scholar
- Cole E. 2009. Network Security Bible. John Wiley & Sons; 2nd ed. ISBN-10: 0470502495. Google ScholarDigital Library
- Aliyun. 2017. Mobile Security. https://cn.aliyun.com/product/mobsec (Accessed: 24/03/2018).Google Scholar
- Carrier, B. 2005. Filesystem Forensic Analysis. Indiana: Addison Wesley Professional, 2005, ISBN: 9780321268174. Google ScholarDigital Library
Index Terms
- Security Audit in Mobile Apps Security Design
Recommendations
Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?
3PGCIC '14: Proceedings of the 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingMobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? ...
Android based mobile apps for information security hands-on education
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to ...
Serving Mobile Apps: A Slice at a Time
EuroSys '19: Proceedings of the Fourteenth EuroSys Conference 2019End users wanting to do more and more with mobile apps has led to explosive growth in the number of available apps. This has widened the gap between developers making apps available and end users being able to install all the apps they want on their ...
Comments