scholarly journals An Analysis of Security and Performance Concerns in Mobile Web Application Development: Challenges and Open Issues

Author(s):  
Douglas Kunda ◽  
Mumbi Chishimba ◽  
Mwenge Mulenga ◽  
Victoria Chama

The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the contemporary issues currently being faced by application developers as they create, update and maintain mobile web applications including Cross-Site Scripting, Cookie hijacking/theft, location hijacking, history theft, behaviour analysis, session hijacking, API design, security and the type of web server used considered.

2019 ◽  
Vol 31 (3) ◽  
pp. 97-112
Author(s):  
Ong Chin Ann ◽  
Fu Swee Tee ◽  
Voon Yang Nen

Web applications are an important platform in today's society, which humans rely on to complete daily tasks. Most of the web applications were developed with sophisticated, well-known, and powerful web development frameworks. While these frameworks evolve and grow at exponential rate, it become very complex, challenging to learn and no longer intuitive for web application developers, especially those who are inexperience and amateur. There is a need for a simpler web development framework which is sufficient for contemporary web application development. Pigeon-table is a simple module developed under ngPigeon project with the aim to generate web content, i.e. table using data from MySQL database with a single html tag. Pigeon-table is intuitive and easy to learn as it was developed with the principle “web developer-centred design” in mind. A pilot test was conducted in this study to evaluate the satisfactory level among amateur web application developers towards pigeon-table as nano-framework.


Organizational web servers reflect the public image of an organization and serve web pages/information to organizational clients via web browsers using HTTP protocol. Some of the web server software may contain web applications that enable users to perform high-level tasks, such as querying a database and delivering the output through the web server to the client browser as an HTML file. Hackers always try to exploit the different vulnerabilities or flaws existing in web servers and web applications, which can pose a big threat for an organization. This chapter provides the importance of protecting web servers and applications along with the different tools used for analyzing the security of web servers and web applications. The chapter also introduces different web attacks that are carried out by an attacker either to gain illegal access to the web server data or reduce the availability of web services. The web server attacks includes denial of service (DOS) attacks, buffer overflow exploits, website defacement with sql injection (SQLi) attacks, cross site scripting (XSS) attacks, remote file inclusion (RFI) attacks, directory traversal attacks, phishing attacks, brute force attacks, source code disclosure attacks, session hijacking, parameter form tampering, man-in-the-middle (MITM) attacks, HTTP response splitting attacks, cross-site request forgery (XSRF), lightweight directory access protocol (LDAP) attacks, and hidden field manipulation attacks. The chapter explains different web server and web application testing tools and vulnerability scanners including Nikto, BurpSuite, Paros, IBM AppScan, Fortify, Accunetix, and ZAP. Finally, the chapter also discusses countermeasures to be implemented while designing any web application for any organization in order to reduce the risk.


Author(s):  
Rizwan Ur Rahman ◽  
Deepak Singh Tomar

Research into web application security is still in its initial phase. In spite of enhancements in web application development, large numbers of security issues remain unresolved. Login attacks are the most malevolent threats to the web application. Authentication is the method of confirming the stated identity of a user. Conventional authentication systems suffer from a weakness that can compromise the defense of the system. An example of such vulnerabilities is login attack. An attacker may exploit a pre-saved password or an authentication credential to log into web applications. An added problem with current authentication systems is that the authentication process is done only at the start of a session. Once the user is authenticated in the web application, the user's identity is assumed to remain the same during the lifetime of the session. This chapter examines the level login attacks that could be a threat to websites. The chapter provides a review of vulnerabilities, threats of login attacks associated with websites, and effective measures to counter them.


Author(s):  
Varsha Sharma ◽  
Rajat Verma ◽  
Vaishali Pathak ◽  
Muskan Paliwal ◽  
Priya Jain

Previously specific features were found in native apps or natively developed apps. There were several various and distinct platforms for development of those features. This was known as cross platform approach; today we have a new approach which is known as progressive web application which can be implemented through a set of latest technologies. This application can then be used on all or almost all platforms. In this research paper we suggest that progressive web applications will suffice the need for native applications. First, we introduce the topic then we will scrutinize the performance and compare the recent specifications provided by each of the technologies for web application development across platforms.


A framework defined as a structure thatsupports the development of dynamic websites, web applications, and services. Framework code and design are often reusable to assist customization, resource service, and API-related tasks. This study discussed current practice to help a developer understand PHP frameworks adoption for web application development. Three approaches were selected to understand the features suitability of the PHP frameworks: the systematic approach, score criteria evaluation, and PHP framework technical factors. A comparison of 23 different frameworks features also has been studied that involves features such as ORM, Code Generator, Template Engine, and CRUD Generator. Besides PHP framework features, understanding the basic core PHP to build web application would help a lot in learning PHP frameworks. Moreover, new developers should not limit themselves to a particular PHP framework only but also allow themselves to explore various PHP frameworks in the development of web application projects.


2005 ◽  
pp. 76-96 ◽  
Author(s):  
Jim Q. Chen ◽  
Richard D. Heath

Web-based application development represents some unique challenges to the developers. There is a growing need for better development methodologies. The traditional system development methods for non-Web applications can still be effective, but need to be adapted and enriched in the new development environment. This chapter discusses the challenges and proposes a Modified Prototyping Method (MPM) for Web application development. MPM views Web applications as organic systems that are continually adapting to their environments. MPM places more emphasis on architectural decision for system scalability and proactive system maintenance. It suggests not only a process but also a set of design techniques at each stage. The method provides a balanced view of technology and management requirements in the Web application development process.


2021 ◽  
Vol 13 (05) ◽  
pp. 1-9
Author(s):  
Rawiphon Charunphankasem

The majority of One Tambon One Product (OTOP) entrepreneurs desired a new packaging design that attracts the attention of consumers. The aims of this research were to 1) determine the packaging demands of entrepreneurs, 2) develop a conceptual framework for web applications, and 3) create web applications. Finally, 4) to ascertain entrepreneurs' satisfaction with the use of web applications in packaging design. The demographic and sample were recruited from the central region's population, entrepreneurs, and customers. Purposive sampling was used to choose 400 entrepreneurs and customers in Saraburi province. The main result was that requirement of entrepreneursabout package must be easy to portable. And Web Application must be also easy to use. By opinion of experts the result of web application development was overall high level and satisfaction of web application that help entrepreneurs to design package was high level. So the benefit of research is that entrepreneurs had web application to design the package and lower cost.


Sign in / Sign up

Export Citation Format

Share Document