{"id":"https://openalex.org/W4413027253","doi":"https://doi.org/10.32604/cmc.2025.067127","title":"Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL","display_name":"Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413027253","doi":"https://doi.org/10.32604/cmc.2025.067127"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067127","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067127","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067127","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023972336","display_name":"K. Rodriguez","orcid":"https://orcid.org/0000-0001-5262-9407"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kevin Santiago Rey Rodriguez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031376693","display_name":"Juli\u00e1n Galindo-Losada","orcid":"https://orcid.org/0000-0002-5700-3435"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juli\u00e1n David Avellaneda Galindo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075541180","display_name":"J. Juan","orcid":"https://orcid.org/0000-0001-6830-7576"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Josep T\u00e1rrega Juan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047759325","display_name":"Juan Ram\u00f3n Bermejo Higuera","orcid":"https://orcid.org/0000-0002-0197-8663"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juan Ram\u00f3n Bermejo Higuera","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031824692","display_name":"Javier Bermejo Higuera","orcid":"https://orcid.org/0000-0003-3681-2572"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Javier Bermejo Higuera","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084194142","display_name":"Juan Antonio Sicilia Montalvo","orcid":"https://orcid.org/0000-0002-5962-4147"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juan Antonio Sicilia Montalvo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023972336"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33603787,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"1","first_page":"1807","last_page":"1858"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.7664999961853027,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.7664999961853027,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.6901000142097473,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spring","display_name":"Spring (device)","score":0.7343140244483948},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.7223648428916931},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6746578216552734},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.6161265969276428},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.60042405128479},{"id":"https://openalex.org/keywords/web-application-development","display_name":"Web application development","score":0.5410327911376953},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.503100574016571},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4289934039115906},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.391565203666687},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23584166169166565},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.22846448421478271},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09949854016304016},{"id":"https://openalex.org/keywords/mechanical-engineering","display_name":"Mechanical engineering","score":0.06561502814292908}],"concepts":[{"id":"https://openalex.org/C2778712887","wikidata":"https://www.wikidata.org/wiki/Q102836","display_name":"Spring (device)","level":2,"score":0.7343140244483948},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.7223648428916931},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6746578216552734},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.6161265969276428},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.60042405128479},{"id":"https://openalex.org/C120927855","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application development","level":4,"score":0.5410327911376953},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.503100574016571},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4289934039115906},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.391565203666687},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23584166169166565},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.22846448421478271},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09949854016304016},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.06561502814292908}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067127","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067127","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067127","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067127","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W299675352","https://openalex.org/W1603550197","https://openalex.org/W2038889476","https://openalex.org/W2063065565","https://openalex.org/W2200266735","https://openalex.org/W2294407885","https://openalex.org/W2531529538","https://openalex.org/W3085670285","https://openalex.org/W4283362579","https://openalex.org/W4307601327","https://openalex.org/W4379530598","https://openalex.org/W4385274673","https://openalex.org/W4388653107","https://openalex.org/W4390942730","https://openalex.org/W4391022790","https://openalex.org/W4391660133","https://openalex.org/W4391915474","https://openalex.org/W4410837043"],"related_works":["https://openalex.org/W2940598554","https://openalex.org/W2370742891","https://openalex.org/W4386575660","https://openalex.org/W2969173574","https://openalex.org/W2379968245","https://openalex.org/W2389826975","https://openalex.org/W2359210272","https://openalex.org/W1563568606","https://openalex.org/W2388385120","https://openalex.org/W2371533215"],"abstract_inverted_index":{"In":[0],"today\u2019s":[1],"rapidly":[2],"evolving":[3],"digital":[4],"landscape,":[5],"web":[6,32,102,116],"application":[7,103,235],"security":[8,28,53,62,91,110,150,171,182,225,236,243,253],"has":[9],"become":[10],"paramount":[11],"as":[12,268],"organizations":[13],"face":[14],"increasingly":[15],"sophisticated":[16,70],"cyber":[17],"threats.":[18],"This":[19,248],"work":[20,192],"presents":[21],"a":[22,56,106,135,141,209,227,240],"comprehensive":[23,81,163],"methodology":[24,131],"for":[25,162],"implementing":[26],"robust":[27,170],"measures":[29],"in":[30,140],"modern":[31],"applications":[33,117],"and":[34,45,75,90,125,158,166,179],"the":[35,38,99,130,145,149,177,185,194,201,261],"proof":[36],"of":[37,101,109,148,181,184,190,197,242,260],"Methodology":[39],"applied":[40],"to":[41,98,114,215],"Vue.js,":[42],"Spring":[43],"Boot,":[44],"MySQL":[46],"architecture.":[47],"The":[48,152,173],"proposed":[49],"approach":[50,250],"addresses":[51],"critical":[52],"challenges":[54],"through":[55,134],"multi-layered":[57],"framework":[58,228],"that":[59,231,252],"encompasses":[60],"essential":[61],"dimensions":[63],"including":[64],"multi-factor":[65],"authentication,":[66],"fine-grained":[67],"authorization":[68],"controls,":[69],"session":[71],"management,":[72],"data":[73],"confidentiality":[74],"integrity":[76],"protection,":[77],"secure":[78,202,220],"logging":[79],"mechanisms,":[80],"error":[82],"handling,":[83],"high":[84],"availability":[85],"strategies,":[86],"advanced":[87],"input":[88],"validation,":[89],"headers":[92],"implementation.":[93],"Significant":[94],"contributions":[95],"are":[96,255],"made":[97],"field":[100],"security.":[104],"First,":[105],"detailed":[107],"catalogue":[108],"requirements":[111],"specifically":[112],"tailored":[113],"protect":[115],"against":[118],"contemporary":[119],"threats,":[120],"backed":[121],"by":[122],"rigorous":[123],"analysis":[124,160],"industry":[126],"best":[127],"practices.":[128],"Second,":[129],"is":[132,193,229],"validated":[133],"carefully":[136],"designed":[137],"proof-of-concept":[138],"implementation":[139],"controlled":[142],"environment,":[143],"demonstrating":[144],"practical":[146],"effectiveness":[147],"measures.":[151],"validation":[153,165,174],"process":[154],"employs":[155],"cutting-edge":[156],"static":[157],"dynamic":[159],"tools":[161],"dependency":[164],"vulnerability":[167],"detection,":[168],"ensuring":[169],"coverage.":[172],"results":[175],"confirm":[176],"prevention":[178],"avoidance":[180],"vulnerabilities":[183],"methodology.":[186],"A":[187],"key":[188],"innovation":[189],"this":[191],"seamless":[195],"integration":[196],"DevSecOps":[198],"practices":[199,222],"throughout":[200],"Software":[203],"Development":[204],"Life":[205],"Cycle":[206],"(SSDLC),":[207],"creating":[208],"security-first":[210],"mindset":[211],"from":[212],"initial":[213],"design":[214],"deployment.":[216],"By":[217],"combining":[218],"proactive":[219],"coding":[221],"with":[223],"defensive":[224],"approaches,":[226],"established":[230],"not":[232],"only":[233],"strengthens":[234],"but":[237],"also":[238],"fosters":[239],"culture":[241],"awareness":[244],"within":[245],"development":[246,262],"teams.":[247],"hybrid":[249],"ensures":[251],"considerations":[254],"woven":[256],"into":[257],"every":[258],"aspect":[259],"process,":[263],"rather":[264],"than":[265],"being":[266],"treated":[267],"an":[269],"afterthought.":[270]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
