Introduction to Software Security for Mobile Platforms Minitrack

Author(s):  
Daniel Plakosh ◽  
Rocbert Seacord
2013 ◽  
Vol 23 (3) ◽  
pp. 82-87 ◽  
Author(s):  
Eva van Leer

Mobile tools are increasingly available to help individuals monitor their progress toward health behavior goals. Commonly known commercial products for health and fitness self-monitoring include wearable devices such as the Fitbit© and Nike + Pedometer© that work independently or in conjunction with mobile platforms (e.g., smartphones, media players) as well as web-based interfaces. These tools track and graph exercise behavior, provide motivational messages, offer health-related information, and allow users to share their accomplishments via social media. Approximately 2 million software programs or “apps” have been designed for mobile platforms (Pure Oxygen Mobile, 2013), many of which are health-related. The development of mobile health devices and applications is advancing so quickly that the Food and Drug Administration issued a Guidance statement with the purpose of defining mobile medical applications and describing a tailored approach to their regulation.


2018 ◽  
Vol 2018 (6) ◽  
pp. 115-1-115-11
Author(s):  
Devasena Inupakutika ◽  
Chetan Basutkar ◽  
Sahak Kaghyan ◽  
David Akopian ◽  
Patricia Chalela ◽  
...  
Keyword(s):  

2020 ◽  
Vol 4 (3) ◽  
pp. 591-600
Author(s):  
Mochammad Rizky Royani ◽  
Arief Wibowo

The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST architecture has limitations in the form of no authentication mechanism, so users can access and modify data. To improve its services, JSON Web Token (JWT) technology is needed in the authentication process and security of access rights. In terms of data storage and transmission security, a cryptographic algorithm is also needed to encrypt and maintain confidentiality in the database. RC4 algorithm is a cryptographic algorithm that is famous for its speed in the encoding process. RC4 encryption results are processed with the Base64 Algorithm so that encrypted messages can be stored in a database. The combination of the RC4 method with the Base64 method has strengthened aspects of database security. This research resulted in a prototype application that was built with a combination of web service methods, JWT and cryptographic techniques. The test results show that the web service application at the logistics service company that was created can run well with relatively fast access time, which is an average of 176 ms. With this access time, the process of managing data and information becomes more efficient because before making this application the process of handling a transaction takes up to 20 minutes.


Author(s):  
Sampada G.C ◽  
Tende Ivo Sake ◽  
Amrita

Background: With the advancement in the field of software development, software poses threats and risks to customers’ data and privacy. Most of these threats are persistent because security is mostly considered as a feature or a non-functional requirement, not taken into account during the software development life cycle (SDLC). Introduction: In order to evaluate the security performance of a software system, it is necessary to integrate the security metrics during the SDLC. The appropriate security metrics adopted for each phase of SDLC aids in defining the security goals and objectives of the software as well as quantify the security in the software. Methods: This paper presents systematic review and catalog of security metrics that can be adopted during the distinguishable phases of SDLC, security metrics for vulnerability and risk assessment reported in the literature for secure development of software. The practices of these metrics enable software security experts to improve the security characteristics of the software being developed. The critical analysis of security metrics of each phase and their comparison are also discussed. Results: Security metrics obtained during the development processes help to improve the confidentiality, integrity, and availability of software. Hence, it is imperative to consider security during the development of the software, which can be done with the use of software security metrics. Conclusion: This paper reviews the various security metrics that are meditated in the copious phases during the progression of the SDLC in order to provide researchers and practitioners with substantial knowledge for adaptation and further security assessment.


Author(s):  
Aaron T. O’Toole ◽  
Stephen L. Canfield

Skid steer tracked-based robots are popular due to their mechanical simplicity, zero-turning radius and greater traction. This architecture also has several advantages when employed by mobile platforms designed to climb and navigate ferrous surfaces, such as increased magnet density and low profile (center of gravity). However, creating a kinematic model for localization and motion control of this architecture is complicated due to the fact that tracks necessarily slip and do not roll. Such a model could be based on a heuristic representation, an experimentally-based characterization or a probabilistic form. This paper will extend an experimentally-based kinematic equivalence model to a climbing, track-based robot platform. The model will be adapted to account for the unique mobility characteristics associated with climbing. The accuracy of the model will be evaluated in several representative tasks. Application of this model to a climbing mobile robotic welding system (MRWS) is presented.


ReCALL ◽  
2021 ◽  
pp. 1-15
Author(s):  
Yan Li ◽  
Christoph A. Hafner

Abstract Considerable research has been conducted on the advancement of mobile technologies to facilitate vocabulary learning and acquisition in a second language (L2). However, whether mobile platforms lead to a comprehensive mastery of both receptive and productive vocabulary knowledge has seldom been addressed in previous literature. This study investigated English vocabulary learning from engagement with mobile-based word cards and paper word cards in the context of the Chinese university classroom. A total of 85 undergraduate students were recruited to take part in the study. The students were divided into two groups, a mobile learning group and a paper-based learning group, and tested on two word knowledge components: receptive knowledge of the form–meaning connection and productive knowledge of collocations. Both the digital and non-digital word cards enhanced L2 vocabulary learning, and the results showed that the mobile application (app) promoted greater gains than physical word cards.


Sign in / Sign up

Export Citation Format

Share Document