skip to main content
10.1145/3207677.3277925acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Security Audit in Mobile Apps Security Design

Authors Info & Claims
Published:22 October 2018Publication History

ABSTRACT

Security1 design of mobile apps is very important, and it is also important that researchers consider and disseminate the continually changing requirements. For mobile application i.e. a software program that runs on a mobile phone, its design, development and management need to consider security impact. In particular, because of mobile app is running on online devices, cyber security defense is required. In this chapter, mobile app security is discussed from the initial planning and design stage to its maintenance after its launch.

References

  1. Antoine Olivier, et al 2013. ISO/IEC 27018: The Future Standard for Personal Data Protection in Public Cloud, EBRC.Google ScholarGoogle Scholar
  2. Feng, X. and Zhang X. 2015. Personally Identifiable Information Security in Cloud Computing. International Conference on Computing and Technology Innovation, UK.Google ScholarGoogle Scholar
  3. ICO. 2016. Overview of the General Data Protection Regulation (GDPR). https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/ (Accessed 14/3/2017)Google ScholarGoogle Scholar
  4. Anderson R., 2008. Security Engineering. 2nd Ed. Wiley, UK ISBN-10: 0470068523, ISBN-13: 978-0470068526.Google ScholarGoogle Scholar
  5. Feng, X, and Conrad M. 2017. Security at the Design Stage. Accepted by ACE-2017, FL. USA.Google ScholarGoogle Scholar
  6. Cole E. 2009. Network Security Bible. John Wiley & Sons; 2nd ed. ISBN-10: 0470502495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Aliyun. 2017. Mobile Security. https://cn.aliyun.com/product/mobsec (Accessed: 24/03/2018).Google ScholarGoogle Scholar
  8. Carrier, B. 2005. Filesystem Forensic Analysis. Indiana: Addison Wesley Professional, 2005, ISBN: 9780321268174. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security Audit in Mobile Apps Security Design

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSAE '18: Proceedings of the 2nd International Conference on Computer Science and Application Engineering
        October 2018
        1083 pages
        ISBN:9781450365123
        DOI:10.1145/3207677

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 October 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        CSAE '18 Paper Acceptance Rate189of383submissions,49%Overall Acceptance Rate368of770submissions,48%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader