There was a simpler time when a telephone was just a phone, and all you could do with it was call people. Nowadays, mobile phones come packed with more processing juice than a small country possessed not so long ago.
“If you go and buy a phone today, you will find it has more computing power than a PC in the late 1980s and even 1990s. But if you look at the third-party software available on the average mobile, it is almost non existent,” explains Fabio Massacci, a professor in security and computer engineering at the University of Trento in Italy.
“This is because the phone and PC markets are very different. Mobile operators are reluctant to allow third-software software on to their devices without certification, which is currently very costly and time-consuming. This discourages many software developers.”
But this is all set to change, if the project Massacci coordinates gains broad industry acceptance. “We have worked to reduce the threshold for certification without compromising security,” he says.Certifiably safe
“The current ‘sandbox’ security model is very simple: you either allow nothing or everything. With security-by-contract, you have more flexibility but also more complexity,” notes Massacci.
In practice, the new system will not prove that complex for end-users, developers and mobile operators. “Users will sign up to certain contractual agreements which specify such things as the number of SMSs an application can send, how many megabytes it can download, and even whether it can work when the power is low.”
Software developers will continue to develop code in the same way, except that they will have to “present an electronic contract and develop a verification process to the mobile operator”, according to Massacci.
This is a vast improvement on the current ‘trusted third-party’ certification which is complex and costly both for developers and operators, pushing it beyond the means of most companies.
“This means that operators will be able to formalise and streamline their third-party contracting process, generating a range of new business streams,” he elaborates.Kaleidoscopic options
“The system allows operators to monitor for applications that violate its policies. It also allows the user to ‘inoculate’ applications that do not have a security policy. In addition, users and application providers can reach their own agreements without the operator.”
The EU-backed project insist that security-by-contract will not replace but enhance today’s security mechanism, and will provide a flexible, simple and scalable security and privacy protection for future mobile systems. The S3MS architecture provides an open platform for the development, loading and run-time execution of downloadable third-party applications on mobile platforms.
The project demonstrated a prototype of the system to some industry players in December 2007 and the final version of the prototype is due out in February 2008.On the horizon
“We are in the process of trademarking ‘security-by-contract,” he says. “We will then discuss what to do after that and what kind of investments and investors we need to take the idea further.”
Christian Nielsen | alfa
Supercomputing the emergence of material behavior
18.05.2018 | University of Texas at Austin, Texas Advanced Computing Center
Keeping a Close Eye on Ice Loss
18.05.2018 | Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung
At the LASYS 2018, from June 5th to 7th, the Laser Zentrum Hannover e.V. (LZH) will be showcasing processes for the laser material processing of tomorrow in hall 4 at stand 4E75. With blown bomb shells the LZH will present first results of a research project on civil security.
At this year's LASYS, the LZH will exhibit light-based processes such as cutting, welding, ablation and structuring as well as additive manufacturing for...
There are videos on the internet that can make one marvel at technology. For example, a smartphone is casually bent around the arm or a thin-film display is rolled in all directions and with almost every diameter. From the user's point of view, this looks fantastic. From a professional point of view, however, the question arises: Is that already possible?
At Display Week 2018, scientists from the Fraunhofer Institute for Applied Polymer Research IAP will be demonstrating today’s technological possibilities and...
So-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics
Recently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...
The historic first detection of gravitational waves from colliding black holes far outside our galaxy opened a new window to understanding the universe. A...
A team led by Austrian experimental physicist Rainer Blatt has succeeded in characterizing the quantum entanglement of two spatially separated atoms by observing their light emission. This fundamental demonstration could lead to the development of highly sensitive optical gradiometers for the precise measurement of the gravitational field or the earth's magnetic field.
The age of quantum technology has long been heralded. Decades of research into the quantum world have led to the development of methods that make it possible...
02.05.2018 | Event News
13.04.2018 | Event News
12.04.2018 | Event News
22.05.2018 | Life Sciences
22.05.2018 | Earth Sciences
22.05.2018 | Trade Fair News