Istituto di Informatica e Telematica     
Lazouski A., Martinelli F., Matteucci I., Costa G., Dragoni N., Issarny V., Saadi R., Massacci F. Security-by-Contract-with-Trust for Mobile Devices. In: Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JOWUA), vol. 1(4) pp. 75 - 91. Innovative Information Science & Technology Research Group, 2011.
Security-by-Contract (SC) is a paradigm providing security assurances for mobile applications.In this work, we present the an extension of SC, called Security-by-Contract-with-Trust (SCT). Indeed, we enrich the SC architecture by integrating a trust model and adding new modules and configurations for managing contracts. Indeed, at deploy-time, our system decides the run-time configuration depending on the credentials of the contract provider. The run-time environment can both enforce a security policy and monitor the declared contract. According to the actual behaviour of the running program our architecture updates the trust level associated with the contract provider.We also present a possible application of our framework in the scenario of a mobile application marketplace, e.g., Apple AppStore, Cydia, Android Market, that, nowadays, are considered as one of the most attractive e-commerce activity for both mobile application developers and industries of mobile devices. Since the number of applications increases, Mobile Applications Marketplace (MAMp) sets up recommendation systems that rank and highlight mobile applications by category, social activity, etc.The SCT framework we propose is applied in this scenario for providing security on customers? mobile devices as well as help Mobile Applications Marketplaces to enhance their recommendation systems with security feedback.The main advantage of this method is an automatic management of the level of trust of software and contract releasers and a unified way for dealing with both security and trust.
Subject Trust Management
Mobile Application Criticality
Managing Feedback
Contract Monitoring
D.4.6 Security and Protection (K.6.5)
C.2.0 [COMPUTER-COMMUNICATION NETWORKS ]: General|Security and protection

Icona documento 1) Download Document PDF

Icona documento Open access Icona documento Restricted Icona documento Private


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional