scholarly journals Cross-Platform Access Control for Mobile Web Applications

Author(s):  
John Lyle ◽  
Salvatore Monteleone ◽  
Shamal Faily ◽  
Davide Patti ◽  
Fabio Ricciato

Mobile software development is an emerging technology. The aim of working on this technology is to make it user-friendly and improve the user experience. This paper focuses on the advancing technology - Progressive Web Apps (PWAs). These apps combine the experience of both native and web applications. Progressive web apps are cross-platform developed which means that the app should function both on Android and iOS platform. While web/hybrid/native apps are costly to build, PWAs are way cheaper to build. These apps provide far better user experience than the conventional native/web/hybrid mobile applications. The service worker is the foundation of a PWA. Service Worker enables caching of assets and controls the network traffic. Manifest file lets the app to be installed on the user’s device. Different caching techniques are discussed in the paper and their performance has been monitored. The performance of the Progressive Web App is analyzed using Blazemeter as Remarkable growth has been seen in the performance of several business platforms after the implementation of progressive web apps. This paper assesses: (1). The difference in features of Native/Mobile Web/ Hybrid Web Mobile with PWAs, (2). Performance Analysis of the caching techniques in PWAs.


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


Author(s):  
Cecilia Challiol ◽  
Sergio Firmenich ◽  
Gabriela Alejandra Bosetti ◽  
Silvia E. Gordillo ◽  
Gustavo Rossi
Keyword(s):  

Web 2.0 applications are becoming ubiquitous applications (i.e., applications that can be accessed by anyone, anywhere, anytime, using any device). A key element of these ubiquitous applications is mobile devices. In fact, the involvement of mobile devices such as smartphones and tablet computers in the development of Web 2.0 applications has resulted in a new kind of Rich Internet Application (RIA) that can run on a variety of devices starting from the same code base, and it is known as multi-device RIA. The term multi-device RIA embraces not only mobile applications but also other kinds of out-of-browser applications such as cross-platform desktop applications as well as the traditional cross-browser Web applications. This chapter formalizes the concept of multi-device RIA, and then it presents an overview of the capabilities of several multi-device development frameworks. This review is finally summarized in a comparative analysis.


Sign in / Sign up

Export Citation Format

Share Document