• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Otras Publicaciones: artículos, libros...
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Otras Publicaciones: artículos, libros...
    • Ver ítem

    Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue. js, Spring Boot and MySQL

    Autor: 
    Rey Rodríguez, Kevin
    ;
    Avellaneda Galindo, Julián David
    ;
    Tárrega Juan, Josep
    ;
    Bermejo Higuera, Juan Ramón
    ;
    Bermejo Higuera, Javier
    ;
    Sicilia Moltalvo, Juan Antonio
    Fecha: 
    2025
    Palabra clave: 
    web security methodology; secure software development lifecycle; DevSecOps; security requirements; secure development; full stack web applications
    Revista / editorial: 
    Computers, Materials & Continua
    Citación: 
    Rodriguez, K.S.R., Galindo, J.D.A., Juan, J.T., Bermejo Higuera, J.R., Bermejo Higuera, J. et al. (2025). Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL. Computers, Materials & Continua, 85(1), 1807–1858. https://doi.org/10.32604/cmc.2025.067127
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/19504
    DOI: 
    https://doi.org/10.32604/cmc.2025.067127
    Dirección web: 
    https://www.techscience.com/cmc/v85n1/63558/html
    Open Access
    Resumen:
    In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js, Spring Boot, and MySQL architecture. The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication, fine-grained authorization controls, sophisticated session management, data confidentiality and integrity protection, secure logging mechanisms, comprehensive error handling, high availability strategies, advanced input validation, and security headers implementation. Significant contributions are made to the field of web application security. First, a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats, backed by rigorous analysis and industry best practices. Second, the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment, demonstrating the practical effectiveness of the security measures. The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection, ensuring robust security coverage. The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology. A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle (SSDLC), creating a security-first mindset from initial design to deployment. By combining proactive secure coding practices with defensive security approaches, a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams. This hybrid approach ensures that security considerations are woven into every aspect of the development process, rather than being treated as an afterthought.
    Mostrar el registro completo del ítem
    Ficheros en el ítem
    icon
    Nombre: TSP_CMC_67127.pdf
    Tamaño: 2.470Mb
    Formato: application/pdf
    Ver/Abrir
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Otras Publicaciones: artículos, libros...

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    2026
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    6
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    2

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Benchmarking Android Malware Analysis Tools 

      Bermejo Higuera, Javier; Morales Moreno, Javier; Bermejo Higuera, Juan Ramón; Sicilia Moltalvo, Juan Antonio; Barreiro Martillo, Gustavo Javier; Sureda Riera, Tomas Miguel (Electronics, 2024)
      Today, malware is arguably one of the biggest challenges organisations face from a cybersecurity standpoint, regardless of the types of devices used in the organisation. One of the most malware-attacked mobile operating ...
    • Systematic Review: Anti-Forensic Computer Techniques 

      González Arias, Rafael; Bermejo Higuera, Javier; J. Javier, Rainer Granados; Bermejo Higuera, Juan Ramón; Sicilia Moltalvo, Juan Antonio (Applied Sciences, 2024)
      The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. ...
    • Integration of Large Language Models (LLMs) and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code. 

      Santas Ciavatta, José Armando; Bermejo Higuera, Juan Ramón; Bermejo Higuera, Javier; Sicilia Moltalvo, Juan Antonio; Sureda Riera, Tomás; Pérez Melero, Jesús (Tech Science Press, Computers, Materials & Continua, 2026)
      As artificial Intelligence (AI) continues to expand exponentially, particularly with the emergence of generative pre-trained transformers (GPT) based on a transformer’s architecture, which has revolutionized data processing ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja