Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms

This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using the...

Full description

Bibliographic Details
Main Authors: Santosh Kumar Henge, Gnaniyan Uma Maheswari, Rajakumar Ramalingam, Sultan S. Alshamrani, Mamoon Rashid, Jayalakshmi Murugan
Format: Article
Language:English
Published: MDPI AG 2023-05-01
Series:Systems
Subjects:
Online Access:https://www.mdpi.com/2079-8954/11/5/262
_version_ 1797598209974992896
author Santosh Kumar Henge
Gnaniyan Uma Maheswari
Rajakumar Ramalingam
Sultan S. Alshamrani
Mamoon Rashid
Jayalakshmi Murugan
author_facet Santosh Kumar Henge
Gnaniyan Uma Maheswari
Rajakumar Ramalingam
Sultan S. Alshamrani
Mamoon Rashid
Jayalakshmi Murugan
author_sort Santosh Kumar Henge
collection DOAJ
description This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices.
first_indexed 2024-03-11T03:16:07Z
format Article
id doaj.art-251dbe3334bf4ebaaf8553008839621c
institution Directory Open Access Journal
issn 2079-8954
language English
last_indexed 2024-03-11T03:16:07Z
publishDate 2023-05-01
publisher MDPI AG
record_format Article
series Systems
spelling doaj.art-251dbe3334bf4ebaaf8553008839621c2023-11-18T03:32:04ZengMDPI AGSystems2079-89542023-05-0111526210.3390/systems11050262Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across PlatformsSantosh Kumar Henge0Gnaniyan Uma Maheswari1Rajakumar Ramalingam2Sultan S. Alshamrani3Mamoon Rashid4Jayalakshmi Murugan5Department of Computer Applications, Directorate of Online Education, Manipal University Jaipur, Jaipur 303007, IndiaDepartment of Computer Science and Engineering, RMK College of Engineering and Technology, Chennai 601206, IndiaSchool of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, IndiaDepartment of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi ArabiaDepartment of Computer Engineering, Faculty of Science and Technology, Vishwakarma University, Pune 411048, IndiaDepartment of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil 626128, IndiaThis article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices.https://www.mdpi.com/2079-8954/11/5/262cloud computingUX/UIcross-platformthird-party librariesdecision makingrule-based security
spellingShingle Santosh Kumar Henge
Gnaniyan Uma Maheswari
Rajakumar Ramalingam
Sultan S. Alshamrani
Mamoon Rashid
Jayalakshmi Murugan
Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
Systems
cloud computing
UX/UI
cross-platform
third-party libraries
decision making
rule-based security
title Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
title_full Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
title_fullStr Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
title_full_unstemmed Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
title_short Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
title_sort dependable and non dependable multi authentication access constraints to regulate third party libraries and plug ins across platforms
topic cloud computing
UX/UI
cross-platform
third-party libraries
decision making
rule-based security
url https://www.mdpi.com/2079-8954/11/5/262
work_keys_str_mv AT santoshkumarhenge dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms
AT gnaniyanumamaheswari dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms
AT rajakumarramalingam dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms
AT sultansalshamrani dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms
AT mamoonrashid dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms
AT jayalakshmimurugan dependableandnondependablemultiauthenticationaccessconstraintstoregulatethirdpartylibrariesandpluginsacrossplatforms