Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
Author:
Henge Santosh Kumar1ORCID, Maheswari Gnaniyan Uma2ORCID, Ramalingam Rajakumar3ORCID, Alshamrani Sultan S.4ORCID, Rashid Mamoon5ORCID, Murugan Jayalakshmi6ORCID
Affiliation:
1. Department of Computer Applications, Directorate of Online Education, Manipal University Jaipur, Jaipur 303007, India 2. Department of Computer Science and Engineering, RMK College of Engineering and Technology, Chennai 601206, India 3. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, India 4. Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia 5. Department of Computer Engineering, Faculty of Science and Technology, Vishwakarma University, Pune 411048, India 6. Department of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil 626128, India
Abstract
This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices.
Funder
Deanship of Scientific Research, Taif University
Subject
Information Systems and Management,Computer Networks and Communications,Modeling and Simulation,Control and Systems Engineering,Software
Reference50 articles.
1. An analysis of security issues for cloud computing;Hashizume;J. Internet Serv. Appl.,2013 2. Zhao, G., Liu, J., Tang, Y., Sun, W., Zhang, F., Ye, X., and Tang, N. (2009). Cloud Computing, Proceedings of the First International Conference on Cloud Computing (CloudCom), Beijing, China, 1–4 December 2009, Springer. 3. Zhang, S., Zhang, S., Chen, X., and Huo, X. (2010, January 22–24). Cloud Computing Research and Development Trend. Proceedings of the Second International Conference on Future Networks (ICFN’10), Sanya, China. 4. Cloud Security Alliance (2023, February 01). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Available online: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf. 5. Marinos, A., and Briscoe, G. (2009). Cloud Computing, Proceedings of the First International Conference, CloudCom 2009, Beijing, China, 1–4 December 2009, Springer. Proceedings 1.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|