Dynamic Wireless Application Development II

Author(s):  
Lei-da Chen ◽  
Gordon W. Skelton

In the previous chapter, we created an m-business application using ColdFusion. Besides ColdFusion, many other development tools can be used to develop m-business applications. Visual Studio .NET, an integrated development environment by Microsoft, has become an increasingly popular corporate applicationdevelopment tool due to its ease of use and support for a wide range of programming languages. Besides traditional Windows and Web applications, Visual Studio .NET also allows developers to build mobile and wireless applications with relative ease. The focus of this chapter is to discuss the tools and techniques for developing wireless applications using Visual Studio .NET. Wireless applications are developed using the ASP .NET Mobile Web Application template. The template provides developers with WYSIWYG tools for creating user interfaces for various mobile devices. These tools work seamlessly with ASP.NET, which uses a form-based approach to build server-side applications for processing user requests and interacting with databases. In this chapter, we will develop a business-to-consumter wireless application using Visual Studio .NET.

Author(s):  
Marut Buranarach ◽  
Thepchai Supnithi ◽  
Ye Myat Thein ◽  
Taneth Ruangrajitpakorn ◽  
Thanyalak Rattanasawad ◽  
...  

Although the Semantic Web data standards are established, ontology-based applications built on the standards are relatively limited. This is partly due to high learning curve and efforts demanded in building ontology-based Semantic Web applications. In this paper, we describe an ontology application management (OAM) framework that aims to simplify creation and adoption of ontology-based application that is based on the Semantic Web technology. OAM introduces an intermediate layer between user application and programming and development environment in order to support ontology-based data publishing and access, abstraction and interoperability. The framework focuses on providing reusable and configurable data and application templates, which allow the users to create the applications without programming skill required. Three forms of templates are introduced: database to ontology mapping configuration, recommendation rule and application templates. We describe two case studies that adopted the framework: activity recognition in smart home domain and thalassemia clinical support system, and how the framework was used in simplifying development in both projects. In addition, we provide some performance evaluation results to show that, by limiting expressiveness of the rule language, a specialized form of recommendation processor can be developed for more efficient performance. Some advantages and limitations of the application framework in ontology-based applications are also discussed.


2005 ◽  
pp. 76-96 ◽  
Author(s):  
Jim Q. Chen ◽  
Richard D. Heath

Web-based application development represents some unique challenges to the developers. There is a growing need for better development methodologies. The traditional system development methods for non-Web applications can still be effective, but need to be adapted and enriched in the new development environment. This chapter discusses the challenges and proposes a Modified Prototyping Method (MPM) for Web application development. MPM views Web applications as organic systems that are continually adapting to their environments. MPM places more emphasis on architectural decision for system scalability and proactive system maintenance. It suggests not only a process but also a set of design techniques at each stage. The method provides a balanced view of technology and management requirements in the Web application development process.


Author(s):  
Vojtěch Toman

With the growing interest in end-to-end XML web application development models, many web applications are becoming predominantly XML-based, requiring XML processing capabilities not only on the-server-side, but often also on the client-side. This paper discusses the potential benefits of using XProc for XML pipeline processing in the web browser and describes the developments of a JavaScript-based XProc implementation.


Author(s):  
Gregory Murray

XQuery is widely known as a query language for XML, but it’s also a full-fledged, functional programming language which, with a limited number of implementation-provided extensions, can serve in a web development context as both the query language and the programming language. When you have data in XML form that needs to be delivered in some way on the web, using XQuery as the server-side programming language has significant practical advantages. After briefly describing those advantages, this paper will lay out techniques for developing web applications in XQuery—techniques that will reduce complexity and help developers produce well-organized, testable, portable code that will be comparatively easy to build upon and maintain over time. Topics include using MVC, keeping functions testable, and facilitating code portability by using available standardizations like RESTXQ and by isolating implementation-specific functions into separate modules.


2005 ◽  
pp. 242-260 ◽  
Author(s):  
Filippo Ricca ◽  
Paolo Tonella

This chapter aims at providing a presentation of the principles and techniques involved in the (semi-)automatic transformation of Web applications, in several different restructuring contexts. The necessary background knowledge is provided to the reader in the sections about the syntax of the multiple languages involved in Web application development and about the role of restructuring in a highly dynamic and rapidly evolving development environment. Then, specific examples of Web restructuring are described in detail. In the presentation of the transformations required for restructuring, as well as in the description of the grammar for the involved languages, TXL (Cordy, Dean, Malton & Schneider, 2002) and its programming language is adopted as a unifying element. The chapter is organized into the following sections: in the section following the Introduction, the problems associated with the analysis of the multiple languages used with Web applications are discussed. Then, the process of Web application restructuring is considered. Three examples of Web restructuring are described in more detail in the next three sections (design restructuring, migration of a static Web site to a dynamic Web application, consistency among monolingual portions of a multilingual Web site). Related works and concluding remarks are at the end of the chapter.


Author(s):  
Hongqing Song ◽  
Stephen Huang

Abstract The purpose of this tool, Rapid Web Application Generator (RWAG), is to allow a user to create a database-driven web application without the knowledge of DBMS and server-side programming. RWAG automatically generates database definitions and ASP pages for manipulating the data. The advantages of using RWAG are as follows: first, a user can create web applications in minutes without ever having to write any code (no need to know ASP, Perl, or Java); secondly, an advanced user can leverage his knowledge of ASP, Perl, Java, JavaScript, HTML, XML and DBMS to expand and customize the web application; thirdly, RWAG allows a user to own a record in the database, which means a record can only be edited by the user who creates it; finally, RWAG provides multiple user access levels. RWAG is ideal for a group of users to share information on the web.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


I-STATEMENT ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 01-08
Author(s):  
Anne Sukmayani ◽  
Erza Sofian ◽  
Abdul Barir Hakim

The development of information technology has a direct impact on the improvement of the mobile phone industry, resulting in increased production and use of smartphones as a medium of information exchange. This development also creates an evolution in the world of mobile services. Android is one of the operating systems on mobile phones that provides an open platform for developers to build applications on various mobile devices. This research aims to build an Android-based mobile application that provides information on tourist attractions in Taman Mini Indonesia Indah. in real time and apply location-based services to the application. This TMII travel guide mobile application was created using Android Studio as an Integrated Development Environment (IDE), Google Maps API, and SQLite and MySql. The programming languages used are java, xml, sql, and php. The research method used is the SDLC (Software Development Life Cycle) approach with the Rapid Application Development (RAD) model.


Sign in / Sign up

Export Citation Format

Share Document