Affiliation:
1. Politecnico di Torino, Italy
2. University of Oxford, UK
Abstract
The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable solutions for the development, implementation, and deployment of complex cross-domain systems, in this chapter, the authors analyse and critically discuss the security-relevant decisions made developing the Webinos security framework. Webinos is an EU-funded FP7 project, which aims to become a universal Web application platform for enabling development and usage of cross domain applications. Presently, Webinos runs on a number of different devices (e.g. mobile, tables, PC, in-car systems, etc.) and different Operating Systems (e.g. various Linux distributions, different Windows and MacOSx versions, Android 4.x, iOS). Thus, Webinos is a representative example of cross-platform framework, and even if yet at beta level, is presently one of the most mature, as a prototype has been publicly available since February 2012. Distilling the lessons learned in the development of the Webinos public specification and prototype, the authors describe how potential threats and risks are identified and mitigated, and how techniques from user-centred design are used to inform the usability of security decisions made while developing the alpha and beta versions of the platform.
Reference41 articles.
1. Android. (2012). Developer guide: Security and permissions, October 2012. Retrieved from http://developer.android.com/guide/topics/security/security.html
2. Ardagna, C. A., di Vimercati, S. D. C., Paraboschi, S., Pedrini, E., & Samarati, P. (2009). An XACML-based privacy-centered access control system. In Proceedings of the First ACM Workshop on Information Security Governance, WISG ’09, (pp. 49–58). ACM.
3. Atzeni, A., Cameroni, C., Faily, S., Lyle, J., & Fléchais, I. (2011). Here’s Johnny: A methodology for developing attacker personas. In Proceedings of the 6th International Conference on Availability, Reliability and Security, (pp. 722–727). IEEE.
4. Making the impossible easy: Usable PKI;D.Balfanz;Security and Usability: Designing Secure Systems that People Can Use,2005
5. BONDI. (n.d.). Architecture and security requirements appendices. Retrieved from http://bondi.omtp.org/1.01/security/BONDI_Architecture_and_Security_Appendices_v1_01.pdf