Affiliation:
1. Università degli Studi di Genova, Italy
2. Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Abstract
In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or unauthorized accesses to personal data (such as personal contacts or business email). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.
Reference52 articles.
1. ConSpec: A Formal Language for Policy Specification.;I.Aktug;Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM 07,2007
2. ConSpec – A Formal Language for Policy Specification
3. Partial model checking
4. Apple Inc. (2014). iOS Security. White Paper. Author.