Economics at your fingertips  

Specialized Applications Used in the Mobile Application Security Implementation Process

Marian Pompiliu Cristescu () and Julian Vasilev ()
Additional contact information
Marian Pompiliu Cristescu: Lucian Blaga University of Sibiu

A chapter in Organizations and Performance in a Complex World, 2021, pp 39-49 from Springer

Abstract: Abstract In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the complexity of each.

Keywords: Open source applications; Mobile applications security; Algorithm; Complexity (search for similar items in EconPapers)
Date: 2021
References: Add references at CitEc
Citations: Track citations by RSS feed

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link:

Ordering information: This item can be ordered from

DOI: 10.1007/978-3-030-50676-6_4

Access Statistics for this chapter

More chapters in Springer Proceedings in Business and Economics from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

Page updated 2023-06-07
Handle: RePEc:spr:prbchp:978-3-030-50676-6_4