The webinos project defines and delivers an open source web application runtime compatible with a wide range of smart devices, including smartphones, tablets, PCs, in-car systems and set-top boxes. A key aim of the project is building a platform which is both secure and protects user privacy. This document describes the security and privacy rational, threat model and architectural risk analysis used by the project. It is a companion document to the webinos system and API specifications and explains why certain security and privacy controls exist and what risks remain. It provides a set of recommendations and describes the outstanding weaknesses and issues of which webinos stakeholders may need to be aware
As personal devices become smarter, opportunities arise for sharing services, applications and data ...
The Internet of Things (IoT) heavily affects our daily lives in many domains, ranging from tiny wear...
Every public and private software system is endemic to malicious attacks for a variety of reasons. N...
The webinos project aims to deliver a cross-device web application runtime environment, providing a ...
This document describes the output of deliverable: User expectations of privacy and security. There...
This poster paper describes the webinos project and presents the architecture and security features ...
This paper describes the webinos project and presents the architecture and security features develop...
This document describes the output of deliverable 2.8: Updates to user expectations of privacy and s...
The need for integrated cross-platform systems is growing. Such systems can enrich the user experien...
This document is one of the deliverables of the ACCEPT project, under WP2 – Foundations, and in part...
The Internet of Things (IoT) is rapidly growing, and offers many economical and societal potentials ...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
Deliverable D2.4 describes an updated set of user stories and use cases as input for the subsequent ...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
As personal devices become smarter, opportunities arise for sharing services, applications and data ...
The Internet of Things (IoT) heavily affects our daily lives in many domains, ranging from tiny wear...
Every public and private software system is endemic to malicious attacks for a variety of reasons. N...
The webinos project aims to deliver a cross-device web application runtime environment, providing a ...
This document describes the output of deliverable: User expectations of privacy and security. There...
This poster paper describes the webinos project and presents the architecture and security features ...
This paper describes the webinos project and presents the architecture and security features develop...
This document describes the output of deliverable 2.8: Updates to user expectations of privacy and s...
The need for integrated cross-platform systems is growing. Such systems can enrich the user experien...
This document is one of the deliverables of the ACCEPT project, under WP2 – Foundations, and in part...
The Internet of Things (IoT) is rapidly growing, and offers many economical and societal potentials ...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
Deliverable D2.4 describes an updated set of user stories and use cases as input for the subsequent ...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
As personal devices become smarter, opportunities arise for sharing services, applications and data ...
The Internet of Things (IoT) heavily affects our daily lives in many domains, ranging from tiny wear...
Every public and private software system is endemic to malicious attacks for a variety of reasons. N...