Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue. js, Spring Boot and MySQL
Autor:
Rey Rodríguez, Kevin
; Avellaneda Galindo, Julián David
; Tárrega Juan, Josep
; Bermejo Higuera, Juan Ramón
; Bermejo Higuera, Javier
; Sicilia Moltalvo, Juan Antonio
Fecha:
2025Palabra clave:
Revista / editorial:
Computers, Materials & ContinuaCitación:
Rodriguez, K.S.R., Galindo, J.D.A., Juan, J.T., Bermejo Higuera, J.R., Bermejo Higuera, J. et al. (2025). Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL. Computers, Materials & Continua, 85(1), 1807–1858. https://doi.org/10.32604/cmc.2025.067127Tipo de Ítem:
articleDirección web:
https://www.techscience.com/cmc/v85n1/63558/html
Resumen:
In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js, Spring Boot, and MySQL architecture. The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication, fine-grained authorization controls, sophisticated session management, data confidentiality and integrity protection, secure logging mechanisms, comprehensive error handling, high availability strategies, advanced input validation, and security headers implementation. Significant contributions are made to the field of web application security. First, a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats, backed by rigorous analysis and industry best practices. Second, the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment, demonstrating the practical effectiveness of the security measures. The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection, ensuring robust security coverage. The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology. A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle (SSDLC), creating a security-first mindset from initial design to deployment. By combining proactive secure coding practices with defensive security approaches, a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams. This hybrid approach ensures that security considerations are woven into every aspect of the development process, rather than being treated as an afterthought.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| 2026 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 6 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 2 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Benchmarking Android Malware Analysis Tools
Bermejo Higuera, Javier; Morales Moreno, Javier; Bermejo Higuera, Juan Ramón; Sicilia Moltalvo, Juan Antonio; Barreiro Martillo, Gustavo Javier; Sureda Riera, Tomas Miguel (Electronics, 2024)Today, malware is arguably one of the biggest challenges organisations face from a cybersecurity standpoint, regardless of the types of devices used in the organisation. One of the most malware-attacked mobile operating ... -
Systematic Review: Anti-Forensic Computer Techniques
González Arias, Rafael; Bermejo Higuera, Javier; J. Javier, Rainer Granados; Bermejo Higuera, Juan Ramón; Sicilia Moltalvo, Juan Antonio (Applied Sciences, 2024)The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. ... -
Integration of Large Language Models (LLMs) and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code.
Santas Ciavatta, José Armando; Bermejo Higuera, Juan Ramón; Bermejo Higuera, Javier; Sicilia Moltalvo, Juan Antonio; Sureda Riera, Tomás; Pérez Melero, Jesús (Tech Science Press, Computers, Materials & Continua, 2026)As artificial Intelligence (AI) continues to expand exponentially, particularly with the emergence of generative pre-trained transformers (GPT) based on a transformer’s architecture, which has revolutionized data processing ...





