Change search
ReferencesLink to record
Permanent link

Direct link
Evaluation of Multi Criteria Decision Making Methods for Potential Use in Application Security
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
2014 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesis
Abstract [en]

With an upsurge in number of available smart phones, tablet PCs etc. most users find it easy to access Internet services using mobile applications. It has been a challenging task for mobile application developers to choose suitable security types (types of authentication, authorization, security protocols, cryptographic algorithms etc.) for mobile applications. Choosing an inappropriate security type for a mobile application may lead to performance degradation and vulnerable issues in applications. The choice of the security type can be done by decision making. Decision making is a challenging task for humans. When choosing a single alternative among a set of alternatives with multiple criteria, it is hard to know which one is the better decision. Mobile application developers need to incorporate Multi-Criteria Decision Making (MCDM) Models to choose a suitable security type for mobile application. A decision model for application security enhances decision making for mobile application developers to decide and set the required security types for the application. In this thesis, we discuss different types of MCDM models that have been applied in an IT security area and scope of applying MCDM models in application security area. Literature review and evaluation of the selected decision models gives a detailed overview on how to use them to provide application security.

Abstract [sv]

The first chapter introduces the thesis work. The second chapter presents the background of decision making models, their process, and the classification of decision making models. The third chapter presents the research methodology we have used in different phases which aims to answer the research questions. The fourth chapter gives a detailed literature study of how decision models can be used in application security. The fifth chapter evaluates selected decision models. The sixth chapter concludes the thesis and presents future work.

Place, publisher, year, edition, pages
2014. , 63 p.
Keyword [en]
Multi-Criteria Decision Making, Mobile Application Security
National Category
Mathematical Analysis Telecommunications Software Engineering
URN: urn:nbn:se:bth-3713Local ID: diva2:831025
Available from: 2015-04-22 Created: 2014-06-24 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(505 kB)411 downloads
File information
File name FULLTEXT01.pdfFile size 505 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Department of Communication Systems
Mathematical AnalysisTelecommunicationsSoftware Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 411 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 129 hits
ReferencesLink to record
Permanent link

Direct link