6533b827fe1ef96bd12859c9

RESEARCH PRODUCT

Specialized Applications Used in the Mobile Application Security Implementation Process

Marian Pompiliu CristescuJulian Vasilev

subject

Open sourceHierarchy (mathematics)Computer scienceProcess (engineering)Distributed computingApplication securitymedia_common.quotation_subjectValue (computer science)Quality (business)media_common

description

In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.

https://doi.org/10.1007/978-3-030-50676-6_4