There was a simpler time when a telephone was just a phone, and all you could do with it was call people. Nowadays, mobile phones come packed with more processing juice than a small country possessed not so long ago.
“If you go and buy a phone today, you will find it has more computing power than a PC in the late 1980s and even 1990s. But if you look at the third-party software available on the average mobile, it is almost non existent,” explains Fabio Massacci, a professor in security and computer engineering at the University of Trento in Italy.
“This is because the phone and PC markets are very different. Mobile operators are reluctant to allow third-software software on to their devices without certification, which is currently very costly and time-consuming. This discourages many software developers.”
But this is all set to change, if the project Massacci coordinates gains broad industry acceptance. “We have worked to reduce the threshold for certification without compromising security,” he says.Certifiably safe
“The current ‘sandbox’ security model is very simple: you either allow nothing or everything. With security-by-contract, you have more flexibility but also more complexity,” notes Massacci.
In practice, the new system will not prove that complex for end-users, developers and mobile operators. “Users will sign up to certain contractual agreements which specify such things as the number of SMSs an application can send, how many megabytes it can download, and even whether it can work when the power is low.”
Software developers will continue to develop code in the same way, except that they will have to “present an electronic contract and develop a verification process to the mobile operator”, according to Massacci.
This is a vast improvement on the current ‘trusted third-party’ certification which is complex and costly both for developers and operators, pushing it beyond the means of most companies.
“This means that operators will be able to formalise and streamline their third-party contracting process, generating a range of new business streams,” he elaborates.Kaleidoscopic options
“The system allows operators to monitor for applications that violate its policies. It also allows the user to ‘inoculate’ applications that do not have a security policy. In addition, users and application providers can reach their own agreements without the operator.”
The EU-backed project insist that security-by-contract will not replace but enhance today’s security mechanism, and will provide a flexible, simple and scalable security and privacy protection for future mobile systems. The S3MS architecture provides an open platform for the development, loading and run-time execution of downloadable third-party applications on mobile platforms.
The project demonstrated a prototype of the system to some industry players in December 2007 and the final version of the prototype is due out in February 2008.On the horizon
“We are in the process of trademarking ‘security-by-contract,” he says. “We will then discuss what to do after that and what kind of investments and investors we need to take the idea further.”
Christian Nielsen | alfa
Construction of practical quantum computers radically simplified
05.12.2016 | University of Sussex
UT professor develops algorithm to improve online mapping of disaster areas
29.11.2016 | University of Tennessee at Knoxville
Physicists of the University of Würzburg have made an astonishing discovery in a specific type of topological insulators. The effect is due to the structure of the materials used. The researchers have now published their work in the journal Science.
Topological insulators are currently the hot topic in physics according to the newspaper Neue Zürcher Zeitung. Only a few weeks ago, their importance was...
In recent years, lasers with ultrashort pulses (USP) down to the femtosecond range have become established on an industrial scale. They could advance some applications with the much-lauded “cold ablation” – if that meant they would then achieve more throughput. A new generation of process engineering that will address this issue in particular will be discussed at the “4th UKP Workshop – Ultrafast Laser Technology” in April 2017.
Even back in the 1990s, scientists were comparing materials processing with nanosecond, picosecond and femtosesecond pulses. The result was surprising:...
Have you ever wondered how you see the world? Vision is about photons of light, which are packets of energy, interacting with the atoms or molecules in what...
A multi-institutional research collaboration has created a novel approach for fabricating three-dimensional micro-optics through the shape-defined formation of porous silicon (PSi), with broad impacts in integrated optoelectronics, imaging, and photovoltaics.
Working with colleagues at Stanford and The Dow Chemical Company, researchers at the University of Illinois at Urbana-Champaign fabricated 3-D birefringent...
In experiments with magnetic atoms conducted at extremely low temperatures, scientists have demonstrated a unique phase of matter: The atoms form a new type of quantum liquid or quantum droplet state. These so called quantum droplets may preserve their form in absence of external confinement because of quantum effects. The joint team of experimental physicists from Innsbruck and theoretical physicists from Hannover report on their findings in the journal Physical Review X.
“Our Quantum droplets are in the gas phase but they still drop like a rock,” explains experimental physicist Francesca Ferlaino when talking about the...
16.11.2016 | Event News
01.11.2016 | Event News
14.10.2016 | Event News
09.12.2016 | Life Sciences
09.12.2016 | Ecology, The Environment and Conservation
09.12.2016 | Health and Medicine