The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.15)
pp: 6-9
Jeffery Payne , Coveros
ABSTRACT
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
INDEX TERMS
Mobile communication, Network security, Best practices, Security, mobile computing, mobile applications, application security, information technology, threat models, mobile security
CITATION
Jeffery Payne, "Secure Mobile Application Development", IT Professional, vol.15, no. 3, pp. 6-9, May-June 2013, doi:10.1109/MITP.2013.46
REFERENCES
1. Apple, iOS Security, May 2012, http://images.apple.com/ipad/business/docs iOS_Security_May12.pdf.
2. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, Jan./Feb. 2009, pp. 50–57.
12 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool