Design and implementation of security solutions for mobile applications using security design patterns

Dissertant

Mahir, Sayf Muhannad

Thesis advisor

Maayitah, Adi Abd al-Halim

University

Isra University

Faculty

Faculty of Information Technology

Department

Department Software Engineering

University Country

Jordan

Degree

Master

Degree Date

2017

English Abstract

Design patterns represent the best methods used by object-oriented software developers; it's defined as of repeatable solution to a commonly occurring problem in software design.

It typically described regarding several aspects, such as intent, structure, behavior, and sample code.

It can accelerate the development process by providing tested, proven development paradigms. Recently, design pattern approach evolved to be a widely used for solving general problems and facilitating reuse.

One computing domain where design patterns can serve an important role is software security.

This can be achieved by creating new patterns to solve existing security problems. The patterns were derived by generalizing current best security design practices.

Security Pattern is utilized for describing a particular repeated security problem that arises in a software system and presents an appropriate approach for its solution.

It categorized according to patterns names such as Single Access Point, Check Point, Roles, Session, Full View with Errors, Limited View, and Secure Access Layer. This thesis focused on Check Point pattern which organizing security checks and their repercussions; it analyzes the Check Point pattern's structure and investigates requests about programs to the pattern and the relation between security and design patterns. Finally attempted presented some of the intuitive requirements when the user requirement found inaccurate or false.

Main Subjects

Information Technology and Computer Science

No. of Pages

72

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background.

Chapter Three : Proposed Model.

Chapter Four : Implementation.

Chapter Five : Conclusion.

References.

American Psychological Association (APA)

Mahir, Sayf Muhannad. (2017). Design and implementation of security solutions for mobile applications using security design patterns. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789436

Modern Language Association (MLA)

Mahir, Sayf Muhannad. Design and implementation of security solutions for mobile applications using security design patterns. (Master's theses Theses and Dissertations Master). Isra University. (2017).
https://search.emarefa.net/detail/BIM-789436

American Medical Association (AMA)

Mahir, Sayf Muhannad. (2017). Design and implementation of security solutions for mobile applications using security design patterns. (Master's theses Theses and Dissertations Master). Isra University, Jordan
https://search.emarefa.net/detail/BIM-789436

Language

English

Data Type

Arab Theses

Record ID

BIM-789436