The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2011 vol.9)
pp: 42-48
David Barrera , Carleton University
Paul van Oorschot , Carleton University
ABSTRACT
This overview of iOS, Android, BlackBerry, and Symbian security frameworks includes a novel classification of third-party-application installation models. It also discusses how controlled app marketplaces fit in the smartphone security ecosystem.
INDEX TERMS
operating systems, smartphones, software installation, security
CITATION
David Barrera, Paul van Oorschot, "Secure Software Installation on Smartphones", IEEE Security & Privacy, vol.9, no. 3, pp. 42-48, May/June 2011, doi:10.1109/MSP.2010.202
REFERENCES
1. "Internet Trends," Morgan Stanley, 12 Apr. 2010; www.morganstanley.com/institutional/techresearch/ pdfsInternet_Trends_041210.pdf .
2. A. Shabtai et al., "Google Android: A Comprehensive Security Assessment," IEEE Security & Privacy, vol. 8, no. 2, 2010, pp. 35–44.
3. "Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010," Gartner, 9 Feb. 2011; www.gartner.com/itpage.jsp?id=1543014.
4. J. Anderson, J. Bonneau, and F. Stajano, "Inglorious Installers: Security in the Application Marketplace," Proc. 9th Workshop Economics of Information Security, 2010; http://weis2010.econinfosec.org/papers/session3 weis2010_anderson_j.pdf.
5. "Apple Answers the FCC's Questions," Apple, 2011; www.apple.com/hotnewsapple-answers-fcc-questions .
6. W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 50–57.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool