VALIDATION OF SECURITY REQUIREMENTS FOR MOBILE APPLICATION: A STUDY
The increased usage of 3G and 4G networks in smartphones has resulted in the need for validating security requirement to ensure safe and secure mobile application experience to users. However, improper validation of security requirements can lead to poor quality of software development. This is al...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | en |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/13717/1/1015004475PID_017--1451-1453-Doc1.pdf http://eprints.utem.edu.my/id/eprint/13717/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The increased usage of 3G and 4G networks in smartphones has resulted in the need for
validating security requirement to ensure safe and secure mobile application experience to users. However,
improper validation of security requirements can lead to poor quality of software development. This is also
commonly happened while developing software application for mobile. Thus, this paper discusses the gaps
found from the existing work on validating the security requirements of mobile application and analyses a
few security requirement engineering tools for mobile application that exist in the market for commercial
or research purposes. We report our findings from review and analysis of different studies on security
requirement engineering for mobile application. The strengths and weaknesses of the features and utility
are also presented to provide further understanding of the gaps and weaknesses of each tool. We conclude
that these tools are still immature and need further improvements.
|
|---|
