Model Driven Security in a Mobile Banking Application Context

被引:1
|
作者
Senturk, Serafettin [1 ]
Yasar, Hasan [2 ]
Sogukpinar, Ibrahim [3 ]
机构
[1] Kuveyt Turk, R&D Ctr, Kocaeli, Turkey
[2] Carnegie Mellon Univ, Software Engn Inst, Pittsburgh, PA 15213 USA
[3] Gebze Tech Univ, Comp Engn, Kocaeli, Turkey
关键词
security by design; authentication; authorization; secure UML; UMLSec; Graphwalker; METHODOLOGY;
D O I
10.1145/3339252.3340529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As there are growing number of mobile devices worldwide, the applications running on the mobile hand-helds have great impact on the human life. One of the biggest factors for the usage of mobile applications is security and privacy since there are lots of personal and sensitive information for the individuals which are stored in these mobile devices. Because the mobile devices interact with many other devices and run on different kinds of communication protocols, the complexity and integration of mobile applications with the other digital entities increases much more ever than before. That is the reason the security and privacy issues for the mobile clients should be considered in very early steps of their application development phase which is exactly the analysis and design steps. In this study some of the security and privacy by design methodologies and toolsets have been explored. In the phase of UML modelling and workflow definition parts of the application development life cycle, some appropriate techniques have been used. From early stages of designing to test case generation and test execution steps have been covered, so that end to end secure mobile application development life cycle has been realized.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Cybersecurity in Banking and Financial Sector: Security Analysis of a Mobile Banking Application
    Panja, Biswajit
    Fattaleh, Dennis
    Mercado, Mark
    Robinson, Adam
    Meharia, Priyanka
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2013, : 397 - 403
  • [2] Security of Mobile Banking Applications
    Szczepanik, Michal
    Jozwiak, Ireneusz
    ADVANCED SOLUTIONS IN DIAGNOSTICS AND FAULT TOLERANT CONTROL, 2018, 635 : 412 - 419
  • [3] A review of Mobile Banking Security
    Nosrati, Leili
    Bidgoli, Amir Massoud
    2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
  • [4] Usage-Driven Personalized Mobile Banking Application: A Research Prototype
    Nawaz, Mohammad
    Motiwalla, Luvai
    Deokar, Amit V.
    SIGMIS-CPR'18: PROCEEDINGS OF THE 2018 ACM SIGMIS CONFERENCE ON COMPUTERS AND PEOPLE RESEARCH, 2018, : 159 - 159
  • [5] Study of security mechanisms for secure mobile commerce architecture through the development of a mobile banking application
    Mehta, Paras
    Organero, Mario Muñoz
    International Review on Computers and Software, 2009, 4 (01) : 1 - 5
  • [6] Security assessment of Mobile- Banking
    Nosrati, Leili
    Bidgoli, Amir Massoud
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [7] Security Issues of Electronic and Mobile Banking
    Wodo, Wojciech
    Stygar, Damian
    Blaskiewicz, Przemyslaw
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 631 - 638
  • [8] Technical Requirements Of New Framework For GPRS Security Protocol Mobile Banking Application
    ElFgee, ElBahlul
    Arara, Ahmed
    5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 451 - +
  • [9] Improving mobile banking security using steganography
    Shirali-Shahreza, Mohammad
    International Conference on Information Technology, Proceedings, 2007, : 885 - 887
  • [10] A Proposal to Improve the Security of Mobile Banking Applications
    Elkhodr, Mahmoud
    Shahrestani, Seyed
    Kourouche, Khaled
    2012 TENTH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING, 2012, : 260 - 265