DocumentCode :
3714485
Title :
OWASP inspired mobile security
Author :
Subrata Acharya;Branden Ehrenreich;James Marciniak
Author_Institution :
Dept. of Computer & Info. Sciences, Towson, Maryland, USA
fYear :
2015
Firstpage :
782
Lastpage :
784
Abstract :
As mobile users continue to trust their devices with sensitive data, it is important to assess the applications that are responsible for securing it. Healthcare related applications are particularly unique because of their involvement with the storage of healthcare information. The healthcare data within an application is used for treatment, payment, operations (TPO). Securing mobile healthcare applications is important because in some cases if a critical application is compromised then it could cause loss of life. This kind of worst case scenario can happen because of incorrect treatment to a patient. With the Open Web Application Security Project (OWASP) as a reference, we will present a methodology based on a checklist implementation and test it against applications that store healthcare data. This methodology is meant for developers to follow when attempting to secure their mobile applications.
Keywords :
"Cryptography","Jamming","Databases","Yttrium","Immune system"
Publisher :
ieee
Conference_Titel :
Bioinformatics and Biomedicine (BIBM), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/BIBM.2015.7359786
Filename :
7359786
Link To Document :
بازگشت