>
Fa   |   Ar   |   En
   Security requirements validation for mobile apps: A systematic literature review  
   
نویسنده yusop n. ,kamalrudin m. ,sidek s.
منبع jurnal teknologi - 2015 - دوره : 77 - شماره : 33 - صفحه:123 -127
چکیده    Security requirements are important to increase the confidence of mobile users to perform many online transactions,such as banking,booking and payment via mobile devices. objective: this study aims to identify the attributes of security requirements for mobile applications (mobile apps) and the existing tools,techniques and approaches used in security requirements. the gaps and limitations for each approach are also discussed. method: we conducted a systematic literature review to identify and analyse related literatures on validation of security requirements for mobile apps. we identified 68 studies that provide relevant information on security requirements for mobile apps. result: there were two main findings: (1) the attributes of security requirements that are relevant for mobile apps are authentication,confidentiality,authorization,access control and integrity; (2) mobile security testing methods for validating security requirements of mobile apps were also identified. finally,the gaps and limitation of each approach requirements in relation to mobile apps were also discussed. conclusions: the main challenge of security requirements is to identify the most appropriate security attributes and security testing technique to validate security requirements for mobile apps. as such,requirements engineers should consider the challenges posed by security requirements such as testing when validating and developing security requirements for mobile apps testing technique. further,correct security requirements for security attributes of security requirements need to be considered at the early stage of development of the mobile apps development. © 2015 penerbit utm press. all rights reserved.
کلیدواژه Mobile application and validation; Security attribute; Security requirements
آدرس centre for advanced computing technology(c-act), Malaysia, centre for advanced computing technology(c-act), Malaysia, centre for advanced computing technology(c-act), Malaysia
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved