Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using the...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Systems |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-8954/11/5/262 |
_version_ | 1797598209974992896 |
---|---|
author | Santosh Kumar Henge Gnaniyan Uma Maheswari Rajakumar Ramalingam Sultan S. Alshamrani Mamoon Rashid Jayalakshmi Murugan |
author_facet | Santosh Kumar Henge Gnaniyan Uma Maheswari Rajakumar Ramalingam Sultan S. Alshamrani Mamoon Rashid Jayalakshmi Murugan |
author_sort | Santosh Kumar Henge |
collection | DOAJ |
description | This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices. |
first_indexed | 2024-03-11T03:16:07Z |
format | Article |
id | doaj.art-251dbe3334bf4ebaaf8553008839621c |
institution | Directory Open Access Journal |
issn | 2079-8954 |
language | English |
last_indexed | 2024-03-11T03:16:07Z |
publishDate | 2023-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Systems |
spelling | doaj.art-251dbe3334bf4ebaaf8553008839621c2023-11-18T03:32:04ZengMDPI AGSystems2079-89542023-05-0111526210.3390/systems11050262Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across PlatformsSantosh Kumar Henge0Gnaniyan Uma Maheswari1Rajakumar Ramalingam2Sultan S. Alshamrani3Mamoon Rashid4Jayalakshmi Murugan5Department of Computer Applications, Directorate of Online Education, Manipal University Jaipur, Jaipur 303007, IndiaDepartment of Computer Science and Engineering, RMK College of Engineering and Technology, Chennai 601206, IndiaSchool of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, IndiaDepartment of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi ArabiaDepartment of Computer Engineering, Faculty of Science and Technology, Vishwakarma University, Pune 411048, IndiaDepartment of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil 626128, IndiaThis article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices.https://www.mdpi.com/2079-8954/11/5/262cloud computingUX/UIcross-platformthird-party librariesdecision makingrule-based security |
spellingShingle | Santosh Kumar Henge Gnaniyan Uma Maheswari Rajakumar Ramalingam Sultan S. Alshamrani Mamoon Rashid Jayalakshmi Murugan Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms Systems cloud computing UX/UI cross-platform third-party libraries decision making rule-based security |
title | Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms |
title_full | Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms |
title_fullStr | Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms |
title_full_unstemmed | Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms |
title_short | Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms |
title_sort | dependable and non dependable multi authentication access constraints to regulate third party libraries and plug ins across platforms |
topic | cloud computing UX/UI cross-platform third-party libraries decision making rule-based security |
url | https://www.mdpi.com/2079-8954/11/5/262 |
work_keys_str_mv | AT santoshkumarhenge dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms AT gnaniyanumamaheswari dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms AT rajakumarramalingam dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms AT sultansalshamrani dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms AT mamoonrashid dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms AT jayalakshmimurugan dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms |