Abstract
The purpose of this study is to develop and present security assessment models to manage the quality of Web2 mobile environments. Web2 is an evolved concept of web from Web 1.0 and Web 2.0 which means, diverse services and technologies including Real-time service, Social Network Services, Augmented Reality technology and Location Based Service are realized in mobile environment. However, compared to Web 1.0 and Web 2.0, few studies have been conducted for the security issues of Web2 mobile environment. To be prepared for such issues, this paper reviews the characteristics of security in Web2 mobile environments and present security assessment models in perspectives of Sensor-generated threats and User-generated threats. This study is significant in that it presents the directionality of the security issues to be discussed later in Web2 mobile environments. This study will have implications for businesses and researchers preparing Web2 mobile services and marketing.
Chapter PDF
Similar content being viewed by others
References
Ji, S.J., Jung, S.Y., Lee, J.H.: Opportunities and Threats of Smart-phone. In: Internet & Security Issues, Korea Information Security Agency, Seoul, Korea (2010)
Jang, S.K.: Security Threats in Smart-phone environment. Korea Information Processing Society Review 17, 64–69 (2010)
Park, J.H.: Web 2.0 Technical Trend and Web Security Threat Analysis. In: Korea Information Security Agency (2006)
Youm, H.Y., Lee, J.S.: Web 2.0 Security Technology Trends and Promoting Standardization. Journal of Telecommunications Technology Association 117, 21–29 (2008)
Lee, C.Y., Kim, C.H., Lee, J.H.: Security Problems and Effective Measures of Inspecting Web in Web 2.0. Korea Institute of Information Security and Cryptology 18, 25–33 (2008)
O’Reilly, T., Battelle, J.: Web Squared: Web 2.0 Five Years on. O’Reilly Media, Inc., Sebastopol (2009)
Kim, S.H., Kim, H.D.: A Study of Web 2.0 Trend & Service View. Research on Digital Policy 5 (2007)
Salomon, M.: Would you consider using online virtual worlds for meetings. Telecommunications Journal of Australia 59 (2009)
Graham, M.: Transparency and Development: Ethical Consumption and Economic Development through Web 2.0 and the Internet of Things (2010)
Wagner, D., Schmalstieg, D.: First Steps Towards Handheld Augmented Reality. In: Proceedings of the 7th IEEE International Symposium on Wearable Computers (2003)
Jung, D.Y.: The changes of future that the augmented reality will bring, Samsung Economic Research Institute, Seoul, Korea (2010)
Geser, H.: Augmenting things, establishments and human beings (2010)
Hong, K.Y., Hong, K.W., Park, J.W., Lee, K.H.: Web Service Security Technology Standardization Trends. Korea Institute of Information Security and Cryptology 14 (2004)
Lim, C.G., Ahn, D.S., Kim, K.H., Lee, K.Y.: A Study on the Web Service-Hacking Pattern Recognition System. Webcasting Internet and Telecommunication Review 9 (2009)
Lee, W.T., Lee, J.E., Yang, S.C., Hwang, Y.S.: The Changes of Citizens’ E-participation and Political Implication in the Age of Convergence between Broadcasting and Telecommunication. Korea Information Society Development Institute (2008)
Ritchie, P.: The Security Risks of AJAX/Web 2.0 Application. Network Security 200, 4–8 (2007)
Kim, W.J., Moon, Y.J., Lee, S.J.: A Study on the Security Vulnerability and Countermeasure in the Mobile Web 2.0 Environments. Journal of Electrical Engineering and Information Science 34 (2007)
Lee, H.D., Park, N.J., Choi, D.H., Chung, K.I.: A Case Study on Mobile USN Technology and Weakness. Korea Institute of Information Security and Cryptology 18 (2008)
Korea Information Security Agency, Threats and Countermeasures on Social Network Environment. Information Security Issue Report, Korea Information Security Agency, Seoul, Korea (2007)
Lee, H.H., Choi, H.C., Kim, J.H., Cho, S.R., Jin, S.H.: A Study of Sharing Identity and Protect on SNS Environments. Korea Institute of Information Security and Cryptology 19 (2009)
Kim, K.Y., Kang, D.H.: Smart-phone Security Solutions in Open-mobile Environment. KIISC Review 19, 21–28 (2009)
Guo, C., Wang, H.J., Zhu, W.: Smart-phone Attacks and Defenses. In: Third Workshop on Hot Topics in Networks HotNets-III, San Diego, CA, USA (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, B.G., Seo, H., Byun, G., Park, K.C., Park, S.K., Kim, T. (2010). Developing Security Assessment Models in Web2 Mobile Environments. In: Daniel, F., Facca, F.M. (eds) Current Trends in Web Engineering. ICWE 2010. Lecture Notes in Computer Science, vol 6385. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16985-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-16985-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16984-7
Online ISBN: 978-3-642-16985-4
eBook Packages: Computer ScienceComputer Science (R0)