Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Management system for secure mobile application development
Guo W.  ACM TURC 2019 (Proceedings of the ACM Turing Celebration Conference - China, Chengdu, China, May 17-19, 2019)1-4.2019.Type:Proceedings
Date Reviewed: Jul 22 2020

Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive and provides verifiable security. Application security is usually assessed outside of (or at the end of) the development life cycle and incurs a heavy cost on productivity and security. Traditional security development approaches do not align well with the mobile application development world due to myriad differences between mobile and desktop systems.

The author’s approach prescribes a security baseline for mobile app development and technical controls that verify the security provided by the baselines. The idea of shifting security left in the development life cycle is not novel, but the presented secure verifiable approach is desirable and moves the needle in the right direction. The overall schema developed by the author is impressive and worth using as a reference to emulate these results in commercial or production development environments to reduce the security exposure of mobile apps.

Reviewer:  Shailesh Rangari Review #: CR147021 (2012-0305)
Bookmark and Share
  Reviewer Selected
 
 
General (K.6.0 )
 
Would you recommend this review?
yes
no
Other reviews under "General": Date
Disaster recovery handbook
, TAB Books, Blue Ridge Summit, PA, 1991. Type: Book (9780830676637)
Aug 1 1991
Management of information technology
Frenzel C., Boyd & Fraser Publishing Co., Danvers, MA, 1992. Type: Book (9780878355082)
Sep 1 1992
Production software that works
Behuniak J., Ahmad I., Courtright A., Digital Press, Newton, MA, 1992. Type: Book (9781555580834)
Dec 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy