Formal, correct and complete definition of the behaviour of a system in terms of security relevant actions.
Published in Chapter:
Application Security for Mobile Devices
Gabriele Costa (Università degli Studi di Genova, Italy), Aliaksandr Lazouski (Consiglio Nazionale delle Ricerche, Italy), Fabio Martinelli (Consiglio Nazionale delle Ricerche, Italy), and Paolo Mori (Consiglio Nazionale delle Ricerche, Italy)
Copyright: © 2015
|Pages: 27
DOI: 10.4018/978-1-4666-6359-6.ch022
Abstract
In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or unauthorized accesses to personal data (such as personal contacts or business email). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.