Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems
نویسندگان
چکیده
Application markets providing one-click software installation have become common to smartphones and are emerging on desktop platforms. Until recently, each platform has had only one market; however, social and economic pressures have resulted in multiple-market ecosystems. Multi-market environments limit, and in some cases eliminate, valuable security characteristics provided by the market model, including kill switches and developer name consistency. We outline a novel approach to retaining single-market security semantics while enabling the flexibility and independence of a multi-market environment. We propose Meteor as a security-enhancing application installation framework that leverages information (e.g., app statistics, expert ratings, developer history) from a configurable set of security information sources. We build a proof-of-concept Android application (Meteorite) to demonstrate the technical feasibility of our proposal. The Meteor approach provides valuable decisionmaking criteria useful not only for smartphone users, but technology consumers as a whole, as new and existing computing environments converge on a market-like model for software installation.
منابع مشابه
Improving Market-Based Task Allocation with Optimal Seed Schedules
Task allocation impacts the performance efficiency of agent teams in significant ways. Due to their efficient and proven performance, Market-based task allocation approaches have grown in popularity for many such multi-agent domains. In addition, market-based approaches are very well suited to dynamic domains such as emergency response, in which the set of the tasks or the environment changes i...
متن کاملAn Analytic Approach to Pheromone-Based Coordination in Synthetic Ecosystems
The systematic application of the synthetic ecosystems approach to the design of multi-agent systems is supported by the use of a generic pheromone infrastructure as extension of the runtime environment of the software agents. Using this infrastructure, insect-like coordination mechanisms may be applied in software systems. This article proposes an analytic model for such a generic pheromone in...
متن کاملTools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support different levels of abstraction and that track all the components that participate in distributed enterprises. Those components must cooperate in a distributed environment to achieve higher-level goals. A special case of secure enterprise computing is multilevel secure (MLS) computing. Components ...
متن کاملFrom Protecting a System to Protecting a Global Ecosystem
The area of security used to be classified by technologies: authentication, access control, monitoring, firewalls, cryptography, etc., or by systems: web security, application security, database security, operating systems security, communication security, etc. However, nowadays, in order to operate a service over the Internet, facing customers, one needs to manage a complex infrastructure. Thi...
متن کاملTsc Advantage Is a Leader in the Commercial Intellectual Asset Protection Market Focusing on Holistic Protection for Our Clients. Experience with the Framework
derived for cyberinsurance. TSC Advantage (TSC), an enterprise risk consultancy, is enhancing cyber risk assessment for commercial organizations, critical infrastructure and the public sector. Through its partnership with leading global insurance underwriters and brokers, TSC is transforming the pre-binding process leveraging its patented Threat Vector ManagerTM (TVM) assessment, which supports...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012