There was a simpler time when a telephone was just a phone, and all you could do with it was call people. Nowadays, mobile phones come packed with more processing juice than a small country possessed not so long ago.
“If you go and buy a phone today, you will find it has more computing power than a PC in the late 1980s and even 1990s. But if you look at the third-party software available on the average mobile, it is almost non existent,” explains Fabio Massacci, a professor in security and computer engineering at the University of Trento in Italy.
“This is because the phone and PC markets are very different. Mobile operators are reluctant to allow third-software software on to their devices without certification, which is currently very costly and time-consuming. This discourages many software developers.”
But this is all set to change, if the project Massacci coordinates gains broad industry acceptance. “We have worked to reduce the threshold for certification without compromising security,” he says.Certifiably safe
“The current ‘sandbox’ security model is very simple: you either allow nothing or everything. With security-by-contract, you have more flexibility but also more complexity,” notes Massacci.
In practice, the new system will not prove that complex for end-users, developers and mobile operators. “Users will sign up to certain contractual agreements which specify such things as the number of SMSs an application can send, how many megabytes it can download, and even whether it can work when the power is low.”
Software developers will continue to develop code in the same way, except that they will have to “present an electronic contract and develop a verification process to the mobile operator”, according to Massacci.
This is a vast improvement on the current ‘trusted third-party’ certification which is complex and costly both for developers and operators, pushing it beyond the means of most companies.
“This means that operators will be able to formalise and streamline their third-party contracting process, generating a range of new business streams,” he elaborates.Kaleidoscopic options
“The system allows operators to monitor for applications that violate its policies. It also allows the user to ‘inoculate’ applications that do not have a security policy. In addition, users and application providers can reach their own agreements without the operator.”
The EU-backed project insist that security-by-contract will not replace but enhance today’s security mechanism, and will provide a flexible, simple and scalable security and privacy protection for future mobile systems. The S3MS architecture provides an open platform for the development, loading and run-time execution of downloadable third-party applications on mobile platforms.
The project demonstrated a prototype of the system to some industry players in December 2007 and the final version of the prototype is due out in February 2008.On the horizon
“We are in the process of trademarking ‘security-by-contract,” he says. “We will then discuss what to do after that and what kind of investments and investors we need to take the idea further.”
Christian Nielsen | alfa
NASA CubeSat to test miniaturized weather satellite technology
10.11.2017 | NASA/Goddard Space Flight Center
New approach uses light instead of robots to assemble electronic components
08.11.2017 | The Optical Society
The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.
Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...
Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.
That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...
Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.
During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....
The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.
Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...
Pillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...
15.11.2017 | Event News
15.11.2017 | Event News
30.10.2017 | Event News
20.11.2017 | Earth Sciences
20.11.2017 | Earth Sciences
20.11.2017 | Life Sciences