This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:OTD 2014 - owasp-mobile.pdf

From OWASP
Revision as of 16:29, 24 December 2014 by Jmorehouse (talk | contribs) (Presentation given by Daniel Bender at OWASP Tampa Day 2014. The mobile application eco-system presents numerous challenges to organizations that seek to apply access control or authorization models to applications. These challenges include the volume...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
OTD_2014_-_owasp-mobile.pdf(file size: 1.75 MB, MIME type: application/pdf)

Presentation given by Daniel Bender at OWASP Tampa Day 2014. The mobile application eco-system presents numerous challenges to organizations that seek to apply access control or authorization models to applications. These challenges include the volume of applications, the complexity of the applications, the limitations of the mobile operating system, the limitations on mobile device management solutions, and the rich interactions that mobile applications have with network based services. When presented with the overwhelming desire to do something, organizations may implement rudimentary blacklists of applications; however, as this presentation will discuss, this approach is not scalable and vastly underestimates the complexity of the mobile eco-system. This presentation will cite examples of organizations that are applying a variety of solutions to this problem and present questions that security professionals should consider when designing solutions.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current16:29, 24 December 2014 (1.75 MB)Jmorehouse (talk | contribs)Presentation given by Daniel Bender at OWASP Tampa Day 2014. The mobile application eco-system presents numerous challenges to organizations that seek to apply access control or authorization models to applications. These challenges include the volume...
  • You cannot overwrite this file.

There are no pages that link to this file.