002/2017); the Administrative Council for Eco-
nomic Defense (TED CADE 08700.000047/2019-
14); and the Federal Attorney General (TED AGU
697.935/2019).
REFERENCES
Agilar, E., Almeida, R., and Canedo, E. (2016). A sys-
tematic mapping study on legacy system moderniza-
tion. In SEKE, pages 345–350. KSI Research Inc. and
Knowledge Systems Institute Graduate School.
Angular.IO. (2010). Architecture overview. template sintax.
Aza
˜
n
´
on C
´
aceres, C. A. (2015). Desarrollo de la apli-
caci
´
on m
´
ovil multiplataforma ToCook. PhD thesis,
ETSI Sistemas Infor.
Barbaglia, G., Murzilli, S., and Cudini, S. (2017). Defini-
tion of REST web services with JSON schema. Softw.,
Pract. Exper., 47(6):907–920.
Belshe, M., Peon, R., and Thomson, M. (2015). Hypertext
transfer protocol version 2 (HTTP/2). RFC, 7540:1–
96.
Bierman, G. M., Abadi, M., and Torgersen, M. (2014). Un-
derstanding typescript. In ECOOP, volume 8586 of
Lecture Notes in Computer Science, pages 257–281.
Springer.
Bihis, C. (2015). Mastering OAuth 2.0. Packt Publishing
Ltd.
Cairns Cade, S. D. (2017). The basics of web application
security.
Chansuwath, W. and Senivongse, T. (2016). A model-
driven development of web applications using angu-
larjs framework. In ICIS, pages 1–6. IEEE Computer
Society.
Chen, E. Y., Pei, Y., Chen, S., Tian, Y., Kotcher, R., and
Tague, P. (2014). Oauth demystified for mobile appli-
cation developers. In Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’14, page 892–903, New York,
NY, USA. Association for Computing Machinery.
Chen, I., Guo, J., and Bao, F. (2016). Trust management
for soa-based iot and its application to service com-
position. IEEE Transactions on Services Computing,
9(3):482–495.
de Sousa Ribeiro, A., Canedo, E. D., and de Freitas, S. A. A.
(2018). An implementation of the oauth 2.0 for an
enterprise service bus. In ICCSA (1), volume 10960 of
Lecture Notes in Computer Science, pages 469–484.
Springer.
Denniss, W., Bradley, J., Jones, M. B., and Tschofenig, H.
(2019). Oauth 2.0 device authorization grant. RFC,
8628:1–21.
Dolphine Tiago; Carnis, C. (2017). The basics of web ap-
plication security.
Eggen, R., Ahuja, S. P., Elliott, P., and Eggen, M. (2004).
Efficiency considerations between common web ap-
plications using the soap protocol. In Communica-
tions, Internet, and Information Technology, pages
461–465. IASTED/ACTA Press.
Fain, Y. and Moiseev, A. (2016). Angular 2 Development
with TypeScript. Manning Publications Co.
Fielding, R. T. and Taylor, R. N. (2000). Architectural
styles and the design of network-based software ar-
chitectures, volume 7. University of California, Irvine
Doctoral dissertation.
Freeman, A. (2019). Understanding typescript. In Essential
TypeScript, pages 35–40. Springer.
Hardt, D. (2012). The oauth 2.0 authorization framework.
Huang, C., Chen, H., Tzeng, Y., and Li, P. (2019). Adap-
tive and service-oriented embedded system for infor-
mation security applications. Computers & Electrical
Engineering, 73:145–154.
Kafle, A. and Lindsey, A. Security in the representational
state transfer api.
Korva, J. et al. (2016). Developing a web application
with angular 2: Graphical editor for happywise’s cove
trainer.
Krylovskiy, A., Jahn, M., and Patti, E. (2015). Designing
a smart city internet of things platform with microser-
vice architecture. In 2015 3rd International Confer-
ence on Future Internet of Things and Cloud, pages
25–30.
Li, W., Mitchell, C. J., and Chen, T. (2019). Oauthguard:
Protecting user security and privacy with oauth 2.0
and openid connect. In SSR, pages 35–44. ACM.
Murray, N., Lerner, A., Coury, F., and Taborda, C. (2016).
ng-book 2: The complete book on angular 2 (volume
2).
Paillier, P. (1999). Public-key cryptosystems based on com-
posite degree residuosity classes. In Stern, J., editor,
Advances in Cryptology — EUROCRYPT ’99, pages
223–238, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
Ramos, M., Valente, M. T., and Terra, R. (2018). Angu-
larjs performance: A survey study. IEEE Software,
35(2):72–79.
Regateiro., D. D.,
´
Oscar Mort
´
agua Pereira., and Aguiar.,
R. L. (2017). Spdc: Secure proxied database con-
nectivity. In Proceedings of the 6th International
Conference on Data Science, Technology and Appli-
cations - Volume 1: DATA,, pages 56–66. INSTICC,
SciTePress.
´
Oscar Mort
´
agua Pereira., Semenski., V., Regateiro., D. D.,
and Aguiar., R. L. (2017). The xacml standard - ad-
dressing architectural and security aspects. In Pro-
ceedings of the 2nd International Conference on In-
ternet of Things, Big Data and Security - Volume 1:
IoTBDS,, pages 189–197. INSTICC, SciTePress.
Somani, U., Lakhani, K., and Mundra, M. (2010). Im-
plementing digital signature with rsa encryption algo-
rithm to enhance the data security of cloud in cloud
computing. In 2010 First International Conference
On Parallel, Distributed and Grid Computing (PDGC
2010), pages 211–216.
Sommerville, I. (2010). Software Engineering. Addison-
Wesley, Harlow, England, 9 edition.
Stallings, W. (2017). Cryptography and network security:
principles and practice. Pearson Upper Saddle River.
ICEIS 2020 - 22nd International Conference on Enterprise Information Systems
240