Academic literature on the topic 'App Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'App Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "App Security"

1

Kumar, Prashant, Naveen Chauhan, Narottam Chand, and Lalit K. Awasthi. "SF-APP." International Journal of Web Services Research 15, no. 2 (April 2018): 47–66. http://dx.doi.org/10.4018/ijwsr.2018040103.

Full text
Abstract:
Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Sajid Nabi, and Ikhlaq Ul Firdous. "Review on Android App Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 225–28. http://dx.doi.org/10.23956/ijarcsse/v7i4/0195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meyer, Helen. "Bank restless with app-level security." Computers & Security 15, no. 3 (January 1996): 221. http://dx.doi.org/10.1016/0167-4048(96)90212-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hurlburt, George, Jeffrey Voas, and Keith W. Miller. "Mobile-App Addiction: Threat to Security?" IT Professional 13, no. 6 (November 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

S.G, Tejashwini, Charitha B, Hemanjali V.T, Pavani C.S, and SwathiReddy D. "Hand-In-Hand -An Android Security App." International Journal of Engineering Trends and Technology 35, no. 6 (May 25, 2016): 247–49. http://dx.doi.org/10.14445/22315381/ijett-v35p253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Costa, Gabriele, Alessio Merlo, Luca Verderame, and Alessandro Armando. "Automatic security verification of mobile app configurations." Future Generation Computer Systems 80 (March 2018): 519–36. http://dx.doi.org/10.1016/j.future.2016.06.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

NEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.

Full text
Abstract:
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android smartphone platform. Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control ow, low-overhead yet high-fidelity record-and-replay. Our tools can analyze substantial, widely-popular apps running directly on smartphones, and do not require access to the app’s source code. We will first present two tools (automated exploration, record-and-replay) that increase Android app reliability by allowing apps to be explored automatically, and bugs replayed or isolated. Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious apps; app profiling to summarize app behavior; and Moving Target Defense for thwarting attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Sankar, E., CH Aditya Karthik, and A. Sai Kiran. "Women Safety App." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1198–201. http://dx.doi.org/10.22214/ijraset.2022.40851.

Full text
Abstract:
Abstract: In today’s world, people using smart phones have increased rapidly andhence, a smart phone can be used efficiently for private security or various protection purposes hence, a smart phone can be used efficiently for private security or various other protection purposes. The dangeous incidents that outraged the entire other protection purposes. The heinous incidents that outraged the entire nation have waken us to go for the safety issues. So we have created a app so that women can feel safe when they go outside. In The feature of this application is to send application is to send the message to the registered contacts continuously, i.e. sharing the message to the registered contacts continuously and sharing the live location. Continuous location tracking information helps to seek out the location, tracking information helps to find the location of the victim and can be rescued safely. Index Terms: Android Application, Women Safety, Java, protection
APA, Harvard, Vancouver, ISO, and other styles
9

Lai, Sen Tarng. "Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security." Applied Mechanics and Materials 182-183 (June 2012): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.2085.

Full text
Abstract:
In the internet age, the high efficiency and high profit activities must incorporate with the internet. Web Application (Web App) is an important IT product in the internet age. However, the network intrusions and security vulnerabilities have continued to threaten the operation of Web App. Penetration Testing (PT) is a critical step to identify security vulnerabilities. However, PT can not provide specific and effective follow-up work. For this, combining corrective maintenance with Web App repair operation will be discussed in this paper. And based on corrective maintenance, proposes a Web App Secure Repair Procedures (WASRP). Applying WASRP, the misjudgment ratio of security vulnerabilities and defects can be reduced. And assist to repair the security vulnerabilities and defects, effectively and concretely enhance the Web App security.
APA, Harvard, Vancouver, ISO, and other styles
10

Shan, Mei Jing. "Research on Data Security of Mobile Payment App." Applied Mechanics and Materials 511-512 (February 2014): 1201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1201.

Full text
Abstract:
This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "App Security"

1

Taylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.

Full text
Abstract:
Smartphones are highly-capable mobile computing devices that have dramatically changed how people do business, interact with online services, and receive entertainment. Smartphone functionality is enhanced by an ecosystem of apps seemingly covering the entire gamut of functionality. While smartphone apps have undoubtedly provided immeasurable benefit to users, they also contribute their fair share of drawbacks, such as increases in security risks and the erosion of user privacy. In this thesis, I focus on the Android smartphone operating system, and pave the way for improving the security and privacy of its app ecosystem. Chapter 3 starts by doing a comprehensive study on how Android apps have evolved over a three-year period, both in terms of their dangerous permission usage and the vulnerabilities they contain. It uncovers a trend whereby apps are using increasing numbers of dangerous permissions over time and at the same time becoming increasingly vulnerable to attack by adversaries. By analysing the Google Play Store, Android's official app marketplace, Chapter 4 shows that many general-purpose apps can be replaced with functionallysimilar alternatives to the benefit of the user. This confirms that users still wield power to improve their own security and privacy. Chapter 5 combines this insight with real-world data from approximately 30,000 smartphones to understand the actual risk that the average user faces as a result of their use of apps, and takes an important first step in measuring the improvements that can be made. Users, however, are not always aware of the risks they face and thus Chapter 6 demonstrates the feasibility of a classification system that can transparently and unobtrusively identify and alert users to the presence of apps of concern on their devices. This classification system identifies apps from features in the network traffic they generate, without itself analysing the payload of their traffic, thus maintaining a high threshold of privacy. While the work presented in this thesis has uncovered undesirable trends in app evolution, and shows that a large fraction of users are exposed to non-trivial risk from the apps they use, in many cases there is suficient diversity in the offerings of general-purpose apps in the Google Play Store to empower users to mitigate the risks coming from the apps they use. This work takes us a step further in keeping users safe as they navigate and enjoy app ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
2

Chia, Pern Hui. "Information Security on the Web and App Platforms : An Economic and Socio-Behavioral Perspective." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Centre for Quantifiable Quality of Service in Communication Systems, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19751.

Full text
Abstract:
Various security measures are ineffective having been designed without adequate usability and economic considerations. The primary objective of this thesis is to add an economic and socio-behavioral perspective to the traditional computer science research in information security. The resulting research is interdisciplinary, and the papers combine different approaches, ranging from analytic modeling to empirical measurements and user studies. Contributing to the fields of usable security and security economics, this thesis fulfills three motivations. First, it provides a realistic game theoretical model for analyzing the dynamics of attack and defense on the Web. Adapted from the classical Colonel Blotto games, our Colonel Blotto Phishing model captures the asymmetric conflict (resource, information, action) between a resource-constrained attacker and a defender. It also factors in the practical scenario where the attacker creates large numbers of phishing websites (endogenous dimensionality), while the defender reactively detects and strives to take them down promptly. Second, the thesis challenges the conventional view that users are always the weakest link or liability in security. It explores the feasibility of leveraging inputs from expert and ordinary users for improving information security. While several potential challenges are identified, we find that community inputs are more comprehensive and relevant than automated assessments. This does not imply that users should be made liable to protect themselves; it demonstrates the potentials of community efforts in complementing conventional security measures. We further analyze the contribution characteristics of serious and casual security volunteers, and suggest ways for improvement. Third, following the rise of third party applications (apps), the thesis explores the security and privacy risks and challenges with both centralized and decentralized app control models. Centralized app control can lead to the risk of central judgment and the risk of habituation, while the increasingly widespread decentralized user-consent permission model also suffers from the lack of effective risk signaling. We find the tendency of popular apps requesting more permissions than average. Compound with the absence of alternative risk signals, users will habitually click through the permission request dialogs. In addition, we find the free apps, apps with mature content, and apps with names mimicking the popular ones, request more permissions than typical. These indicate possible attempts to trick the users into compromising their privacy.
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, Duc Cuong [Verfasser]. "Improving Android app security and privacy with developers / Duc Cuong Nguyen." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1241117314/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.

Full text
Abstract:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
APA, Harvard, Vancouver, ISO, and other styles
5

Pujari, Medha Rani. "PortableVN: A Generic Mobile Application for Security Testbeds." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1564680092560925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barreto, Razquin Oscar Maximiliano, Torpoco Karem Angelli Cardenas, Espinoza Cinthia Alejandra Rojas, Alvarado Sebastian Sanchez, and Quiroz Nicole Suheid Serna. "Proyecto Pulsos App." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654648.

Full text
Abstract:
El presente documento de investigación contiene la implementación de un proyecto de emprendimiento orientado hacia la venta de un servicio aplicativo móvil que reduzca la cantidad de mujeres que sufren de acoso de cualquier tipo en la ciudad de Lima, Perú. Dicha investigación se realizó dentro de los NSE “A” y “B” que posean Smartphone en Lima Metropolitana. Se considera a este proyecto como una idea disruptiva debido a la escasez de competencias, falta de productos similares, aparición de nuevas tecnologías y tendencias. Así mismo, se considera importante abordar esta problemática con un producto efectivo debido a la continua aparición de incidencias, quejas y noticias que se manifiestan día a día en el país. Para concretar este proyecto, se logró efectuar un análisis a detalle para poder validar la rentabilidad, escalabilidad y viabilidad de nuestro servicio con los siguientes temas: Validación del modelo de negocio, Desarrollo del plan de negocios, Plan de operaciones, Plan de recursos humanos, Plan de marketing, Plan de responsabilidad social empresarial, Plan financiero y presupuestos. Por último, la aplicación de este servicio al mercado empresarial puede despertar intereses en organizaciones sin fines de lucro, organizaciones civiles, políticas y gubernamentales con la finalidad que generen un cambio en la sociedad tras la problemática existente.
This research document contains the implementation of an entrepreneurial project aimed at selling a mobile application service that will reduce the number of women suffering from harassment of any kind in the city of Lima, Peru. This research was conducted within the NSE "A" and "B" that have smartphones in Metropolitan Lima. This project is considered a disruptive idea due to the shortage of skills, lack of similar products, emergence of new technologies and trends. Likewise, it is considered important to address this issue with an effective product due to the continuous appearance of incidents, complaints and news that are manifested every day in the country. In order to make this project concrete, a detailed analysis was carried out to validate the profitability, scalability and viability of our service with the following topics: Validation of the business model, Development of the business plan, Operations plan, Human resources plan, Marketing plan, Corporate social responsibility plan, Financial plan and budgets. Finally, the application of this service to the business market can arouse interest in nonprofit organizations, civil organizations, political and government in order to generate a change in society after the existing problems.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
7

Amini, Shahriyar. "Analyzing Mobile App Privacy Using Computation and Crowdsourcing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/327.

Full text
Abstract:
Mobile apps can make use of the rich data and sensors available on smartphones to offer compelling services. However, the use of sensitive resources by apps is not always justified, which has led to new kinds of privacy risks and challenges. While it is possible for app market owners and third-parties to analyze the privacy-related behaviors of apps, present approaches are difficult and tedious. I present two iterations of the design, implementation, and evaluation of a system, Gort, which enables more efficient app analysis, by reducing the burden of instrumenting apps, making it easier to find potential privacy problems, and presenting sensitive behavior in context. Gort interacts with apps while instrumenting them to detect sensitive information transmissions. It then presents this information along with the associated app context to a crowd of users to obtain their expectations and comfort regarding the privacy implications of using the app. Gort also runs a set of heuristics on the app to flag potential privacy problems. Finally, Gort synthesizes the information obtained through its analysis and presents it in an interactive GUI, built specifically for privacy analysts. This work offers three distinct new advances over the state of the art. First, Gort uses a set of heuristics, elicited through interviews with 12 experts, to identify potential app privacy problems. Gort heuristics present high-level privacy problems instead of the overwhelming amount of information offered through existing tools. Second, Gort automatically interacts with apps by discovering and interacting with UI elements while instrumenting app behavior. This eliminates the need for analysts to manually interact with apps or to script interactions. Third, Gort uses crowdsourcing in a novel way to determine whether app privacy leaks are legitimate and desirable and raises red flags about potentially suspicious app behavior. While existing tools can detect privacy leaks, they cannot determine whether the privacy leaks are beneficial or desirable to the user. Gort was evaluated through two separate user studies. The experiences from building Gort and the insights from the user studies guide the creation of future systems, especially systems intended for the inspection and analysis of software.
APA, Harvard, Vancouver, ISO, and other styles
8

Barton, Daniel John Trevino. "Usable Post-Classification Visualizations for Android Collusion Detection and Inspection." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/72286.

Full text
Abstract:
Android malware collusion is a new threat model that occurs when multiple Android apps communicate in order to execute an attack. This threat model threatens all Android users' private information and system resource security. Although recent research has made advances in collusion detection and classification, security analysts still do not have robust tools which allow them to definitively identify colluding Android applications. Specifically, in order to determine whether an alert produced by a tool scanning for Android collusion is a true-positive or a false-positive, the analyst must perform manual analysis of the suspected apps, which is both time consuming and prone to human errors. In this thesis, we present a new approach to definitive Android collusion detection and confirmation by rendering inter-component communications between a set of potentially collusive Android applications. Inter-component communications (abbreviated to ICCs), are a feature of the Android framework that allows components from different applications to communicate with one another. Our approach allows Android security analysts to inspect all ICCs within a set of suspicious Android applications and subsequently identify collusive attacks which utilize ICCs. Furthermore, our approach also visualizes all potentially collusive data-flows within each component within a set of apps. This allows analysts to inspect, step-by-step, the the data-flows that are currently used by collusive attacks, or the data-flows that could be used for future collusive attacks. Our tool effectively visualizes the malicious and benign ICCs in sets of proof-of-concept and real-world colluding applications. We conducted a user study which revealed that our approach allows for accurate and efficient identification of true- and false-positive collusive ICCs while still maintaining usability.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Gutierrez, Ramirez Pedro Reynaldo, Gago Jesus Martin Lopez, Cayo Alvaro Martin Peschiera, Robles Celia Elizabeth Torres, and Huby Johana Alexandra Vega. "Emprendimiento de negocio: jala a tu pata." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/626550.

Full text
Abstract:
Nuestro proyecto consiste es crear una aplicación que sea intermediaria entre los estudiantes actuando como clientes, que necesiten llegar a su destino a través de carros particulares de manera segura, cómoda y rápida, con conductores, los cuales serán otros estudiantes que dispongan de vehículos y vayan por rutas similares o iguales. Nuestro mercado objetivo son jóvenes universitarios de la ciudad de Lima de 18 a 24 años de un nivel socioeconómico A, B y C. Además, nuestro servicio se diferencia de la competencia, ya que tenemos como política desarrollar actividades de RSE para preservar el cuidado del medio ambiente. Asimismo, cabe resaltar que el mercado limeño es altamente atractivo por la creciente demanda en donde dice que este año y el próximo año la demanda de carros aumentará en 250 mil carros cada año. Para el desarrollo del proyecto, se han realizado análisis cualitativo y cuantitativo, utilizando herramientas como entrevistas y aplicación de encuestas, teniendo como fin determinar el comportamiento de los usuarios y medir el nivel de aceptación de nuestro proyecto. Finalmente, se explicará y se desarrollará el plan financiero y los principales KPI´s de rentabilidad de negocio, la cual permitirá demostrar la sostenibilidad, rentabilidad y escalabilidad del negocio.
Our Business Entrepreneurship Assignment is about creating an app that is an intermediary between students acting as customers, who need to reach their destination through private cars safely, comfortably and quickly and students with cars playing as drivers that go by similar routes. We set as target market is young university students in the city of Lima from 18 to 24 years of socioeconomic level A, B and C. In addition, our service differs from the competition, since we have as policy to develop CSR activities to preserve the care of the environment. Also, it should be noted that the limeño market is highly attractive due to the growing demand where it says that this year and next year the demand for cars will increase by 250 thousand cars each year. For the development of the project, qualitative and quantitative analysis has been carried out, using tools such as interviews and survey application, with the purpose of determining the behavior of users and measuring the level of acceptance of our project. Finally, the financial plan and the main KPIs of business profitability will be explained and developed, which will allow demonstrating the sustainability, profitability and scalability of the business.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, Fengguo. "Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7377.

Full text
Abstract:
This dissertation presents a new approach to static analysis for security vetting of Android apps, and a general framework called Argus-SAF. Argus-SAF determines points-to information for all objects in an Android app component in a flow and context-sensitive (user-configurable) way and performs data-flow and data dependence analysis for the component. Argus-SAF also tracks inter-component communication activities. It can stitch the component-level information into the app- level information to perform intra-app or inter-app analysis. Moreover, Argus-SAF is NDK/JNI- aware and can efficiently track precise data-flow across language boundary. This dissertation shows that, (a) the aforementioned type of comprehensive app analysis is utterly feasible in terms of computing resources with modern hardware, (b) one can easily leverage the results from this general analysis to build various types of specialized security analyses – in many cases the amount of additional coding needed is around 100 lines of code, and (c) the result of those specialized analyses leveraging Argus-SAF is at least on par and often exceeds prior works designed for the specific problems, which this dissertation demonstrate by comparing Argus-SAF’s results with those of prior works whenever the tool can be obtained. Since Argus-SAF’s analysis directly handles intercomponent and inter-language control and data flows, it can be used to address security problems that result from interactions among multiple components from either the same or different apps and among java code and native code. Argus-SAF’s analysis is sound in that it can assure the absence of the specified security problems in an app with well-specified and reasonable assumptions on Android runtime system and its library.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "App Security"

1

service), SpringerLink (Online, ed. Pro ASP.NET Web API Security: Securing ASP.NET Web API. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bush), United States President (1989-1993 :. Decision to order the divestment of a company located in Seattle, WA: Communication from the President of the United States transmitting a report on his decision to order the divestment of a company located in Seattle, WA; copy of the order, pursuant to 50 U.S.C. app. 2170. Washington: U.S. G.P.O., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Siriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-2050-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vollmert, Robert. ADP security at NRL. Washington, DC: Naval Research Laboratory, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Longley, Dennis, and Michael Shain. Data & Computer Security. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-11170-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eloff, Jan H. P., Les Labuschagne, Rossouw von Solms, and Jan Verschuren, eds. Information Security Management & Small Systems Security. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Telecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Washington, DC: Veterans Administration, Office of Data Management and Telecommunications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lakshmiraghavan, Badrinarayanan. Pro ASP.NET Web API Security. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eloff, Jan H. P., Les Labuschagne, Rossouw Solms, and Gurpreet Dhillon, eds. Advances in Information Security Management & Small Systems Security. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/b116849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "App Security"

1

Wright, Steve. "SharePoint App Security." In Pro SharePoint 2013 App Development, 145–84. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5885-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gunasekera, Sheran. "Hacking Your App." In Android Apps Security, 91–119. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Henry, and Eugene Chuvyrov. "Security." In Beginning Windows Phone App Development, 479–512. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4135-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Relan, Kunal. "iOS App Security Practices." In iOS Penetration Testing, 119–29. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2355-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gunasekera, Sheran. "App Licensing and SafetyNet." In Android Apps Security, 35–56. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gunasekera, Sheran. "Hacking Your App #2." In Android Apps Security, 145–72. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Liangjun. "Security." In iOS eCommerce App Development with Parse, 185–90. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Rakesh. "Platform Security." In Salesforce Platform App Builder Certification, 53–91. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5479-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herath, Pushpa. "App Service Environments." In Azure Cloud Security for Absolute Beginners, 207–28. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7860-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Northern, Carlton, Michael Peck, Johann Thairu, and Vincent Sritapan. "Mobile Per-app Security Settings." In Advances in Intelligent Systems and Computing, 696–715. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73100-7_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "App Security"

1

Hedin, Daniel. "App security with JSFlow." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897073.2897714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cox, Landon. "Session details: Session VIII: App Security & Privacy." In MobiSys'16: The 14th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3257203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mrabti, Almokhtar Ait El, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, and Mina De Montfort. "Mobile app security by fragmentation "MASF"." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3036371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gadient, Pascal, Marc-Andrea Tarnutzer, Oscar Nierstrasz, and Mohammad Ghafari. "Security Smells Pervade Mobile App Servers." In ESEM '21: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3475716.3475780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ravitch, Tristan, E. Rogan Creswick, Aaron Tomb, Adam Foltzer, Trevor Elliott, and Ledah Casburn. "Multi-App Security Analysis with FUSE." In the 4th Program Protection and Reverse Engineering Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2689702.2689705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Belenko, Vyacheslav, Dmitry Zegzhda, Petr Zegzhda, Semen Kort, Vladimir Chernenko, and Woosung Kim. "Security verification of the programs in webOS app store." In Security 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.58.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hintz, Kenneth J., Christopher J. Hintz, Faris Almomen, Christian Adounvo, and Michael D' Amato. "THELMA: a mobile app for crowdsourcing environmental data." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2014. http://dx.doi.org/10.1117/12.2058690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Canova, Gamze, Melanie Volkamer, Clemens Bergmann, and Benjamin Reinheimer. "NoPhish App Evaluation: Lab and Retention Study." In Workshop on Usable Security. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/usec.2015.23009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cristalli, Stefano, Long Lu, Danilo Bruschi, and Andrea Lanzi. "Detecting (absent) app-to-app authentication on cross-device short-distance channels." In ACSAC '19: 2019 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3359789.3359814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katamba, Ronald, and Brian Mutebi. "Jaguza livestock app, the app transforming livestock production and strengthening food security." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102352.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "App Security"

1

Yu, Dongting, Andrew W. Moore, Chris Hall, and Ross Anderson. Security: a Killer App for SDN? Fort Belvoir, VA: Defense Technical Information Center, October 2014. http://dx.doi.org/10.21236/ada613601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agarwal, Smisha, Madhu Jalan, Holly C. Wilcox, Ritu Sharma, Rachel Hill, Emily Pantalone, Johannes Thrul, Jacob C. Rainey, and Karen A. Robinson. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), May 2022. http://dx.doi.org/10.23970/ahrqepctb41.

Full text
Abstract:
Background. Mental health mobile applications (apps) have the potential to expand the provision of mental health and wellness services to traditionally underserved populations. There is a lack of guidance on how to choose wisely from the thousands of mental health apps without clear evidence of safety, efficacy, and consumer protections. Purpose. This Technical Brief proposes a framework to assess mental health mobile applications with the aim to facilitate selection of apps. The results of applying the framework will yield summary statements on the strengths and limitations of the apps and are intended for use by providers and patients/caregivers. Methods. We reviewed systematic reviews of mental health apps and reviewed published and gray literature on mental health app frameworks, and we conducted four Key Informant group discussions to identify gaps in existing mental health frameworks and key framework criteria. These reviews and discussions informed the development of a draft framework to assess mental health apps. Iterative testing and refinement of the framework was done in seven successive rounds through double application of the framework to a total of 45 apps. Items in the framework with an interrater reliability under 90 percent were discussed among the evaluation team for revisions of the framework or guidance. Findings. Our review of the existing frameworks identified gaps in the assessment of risks that users may face from apps, such as privacy and security disclosures and regulatory safeguards to protect the users. Key Informant discussions identified priority criteria to include in the framework, including safety and efficacy of mental health apps. We developed the Framework to Assist Stakeholders in Technology Evaluation for Recovery (FASTER) to Mental Health and Wellness and it comprises three sections: Section 1. Risks and Mitigation Strategies, assesses the integrity and risk profile of the app; Section 2. Function, focuses on descriptive aspects related to accessibility, costs, organizational credibility, evidence and clinical foundation, privacy/security, usability, functions for remote monitoring of the user, access to crisis services, and artificial intelligence (AI); and Section 3. Mental Health App Features, focuses on specific mental health app features, such as journaling and mood tracking. Conclusion. FASTER may be used to help appraise and select mental health mobile apps. Future application, testing, and refinements may be required to determine the framework’s suitability and reliability across multiple mental health conditions, as well as to account for the rapidly expanding applications of AI, gamification, and other new technology approaches.
APA, Harvard, Vancouver, ISO, and other styles
3

Wray, J. Generic Security Service API : C-bindings. RFC Editor, September 1993. http://dx.doi.org/10.17487/rfc1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Terry, Stefanie F. S&S-PRG-036 ? SECURITY CONNECTION. Office of Scientific and Technical Information (OSTI), July 2016. http://dx.doi.org/10.2172/1494329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Melton, R. ADP Security Plan, Math Building, Room 1139. Office of Scientific and Technical Information (OSTI), August 1985. http://dx.doi.org/10.2172/79006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reiss, Peter T. Airline Safety & Security: An International Perspective. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada351545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Everhart, Kathie. Computer security training & awareness course compendium. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brauer, F. P. ADP security plan, 320 Building, Room 110. Office of Scientific and Technical Information (OSTI), August 1985. http://dx.doi.org/10.2172/10121000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holt, J. G., and J. D. Fluckiger. Approval of revised ADP security plan: National Security Technology, ROB/1401 and 1403. Office of Scientific and Technical Information (OSTI), June 1985. http://dx.doi.org/10.2172/31375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Flagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.

Full text
Abstract:
U.S. research security requires trust and collaboration between those conducting R&D and the federal government. Most R&D takes place in the private sector, outside of government authority and control, and researchers are wary of federal government or law enforcement involvement in their work. Despite these challenges, as adversaries work to extract science, technology, data and know-how from the United States, the U.S. government is pursuing an ambitious research security initiative. In order to secure the 78 percent of U.S. R&D funded outside the government, authors Melissa Flagg and Zachary Arnold propose a new, public-private research security clearinghouse, with leadership from academia, business, philanthropy, and government and a presence in the most active R&D hubs across the United States.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography