and Lifelong Learning of the National Strategic
Reference Framework - Research Funding Program:
HE-RACLEITUS II - Investing in Knowledge
Society.
REFERENCES
Adleman, L. (1990). An Abstract Theory of Computer
Viruses. In S. Goldwasser, Advances in Cryptology —
CRYPTO’ 88 (pp. 354-374). Berlin: Springer/
Heidelberg.
Apple. (2011a). iOS Dev Center. Retrieved February 18,
2011, from http://developer.apple.com/devcenter/ios/
Apple. (2011b). iOS Developer Program. Retrieved
February 18, 2011, from http://developer.apple.com/
programs/ios/
CISCO. (2011). Cisco 2010 Annual Security Report.
Retrieved February 18, 2011, from http://
www.cisco.com/en/US/prod/vpndevc/annual_security
_report.html
Cohen, F. (1989). Computational aspects of computer vi-
ruses. Computers & Security, 8(4), 325-344.
Gartner. (2010). Gartner Press Releases. Retrieved
February 18, 2011, from http://www.gartner.com/it/
page.jsp?id=1466313
Gartner. (2011). Gartner Press Releases. Retrieved
February 18, 2011, from http://www.gartner.com/it/
page.jsp?id=1529214
Google. (2011a). Exercising Our Remote Application
Removal Feature. Retrieved February 18, 2011, from
http://android-developers.blogspot.com/ 2010/06/
exercising-our-remote-application.html
Google. (2011b). Platform Versions. Retrieved February
18, 2011, from http://developer.android.com/
resources/ dashboard/platform-versions.html
Google. (2011c). Security and Permissions. Retrieved
February 18, 2011, from http://developer.android.com/
guide/topics/security/ security.html
GSMA. (2011). Mobile Privacy. Retrieved February 18,
2011, from http://www.gsmworld.com/our-work/
public-policy/ mobile_privacy.htm
Hogben, G., Dekker, M. (2011). Smartphone security:
Information security risks, opportunities and recom-
mendations for users. Retrieved from:
http://www.enisa. europa.eu/act/it/oar/ smartphones-
information-security-risks-opportunities-and-
recommendations-for-users/at_download/fullReport
Hypponen, M. (2006). Malware goes mobile. Scientific
American, 295(5), 70-77.
Kephart, J., White, S. (1991) Directed graph epidemiologi-
cal models of computer viruses. 1991 IEEE Symposi-
um on Research in Security and Privacy, 343-359.
Lineberry, A., Richardson, D., Wyatt, T. (2010). These
aren’t the permissions you ‘re looking for. Retrieved
from https://www.defcon.org/images/defcon-18/dc-18-
presentations/Lineberry/DEFCON-18-Lineberry-Not-
The-Permissions-You-Are-Looking-For.pdf
McAfee. (2010). 2011 Threats predictions. Retrieved from
http://www.mcafee.com/us/resources/reports/rp-threat-
predictions-2011.pdf
Microsoft. (2010a). Security Policy Settings. Retrieved
February 18, 2011, from http://msdn.microsoft.com
/en-us/library/bb416355.aspx
Microsoft. (2010b). Windows Mobile Code Signing.
Retrieved February 18, 2011, from
http://msdn.microsoft.com/en-us/windowsmobile/
dd569132.aspx
Microsoft. (2010c). Windows Mobile Device Security
Model. Retrieved February 18, 2011, from http://
msdn.microsoft.com/en-us/library/ bb416353.aspx
Microsoft. (2010d). Windows Phone 7 Series Developer
General FAQ. Retrieved February 18, 2011, from
http://social.msdn.microsoft.com/Forums/en/windows
phone7series/thread/2892a6f0-ab26-48d6-b63c-
e38f62eda3b3
Nokia. (2011a). Capabilities. Retrieved February 18,
2011, from http://wiki.forum.nokia.com/index.php/
Capabilities
Nokia. (2011b). Developer certificate. Retrieved February
18, 2011, from http://wiki.forum.nokia.com/index.php/
Developer_certificate
Nokia. (2011c). Symbian Signed. Retrieved February 18,
2011, from https://www.symbiansigned.com/app/page
PAMPAS. (2011). Pioneering Advanced Mobile Privacy
and Security. Retrieved February 18, 2011, from
http://www.pampas.eu.org/
RIM. (2011d). Java Code Signing Keys. Retrieved
February 18, 2011, from http://us.blackberry.com/
developers/javaappdev/codekeys.jsp
RIM. (2011e). Security Overview. Retrieved February 18,
2011, from http://docs.blackberry.com/en/developers/
deliverables/21091/Security
_overview_1304155_11.jsp
Seriot, N. (2010). iPhone Privacy. Retrieved from http://
seriot.ch/resources/talks_papers/iPhonePrivacy.pdf
Sindhu, U., Balaouras, S., Hayes, N., Coit, L. (2010). The
Security of B2B: Enabling An Unbounded Enterprise.
Retrieved February 18, 2011, from
http://www.forrester.com/rb/Research/security_of_b2b_en
abling_unbounded_enterprise/q/id/56670/t/2
Smartphone Experts (2011). CrackBerry.com – The #1
Site for BlackBerry Users & Abusers. Retrieved
February 18, 2011, from http://crackberry.com/
Sophos (2011). Pirated Mac App Store apps pose major
risk. Retrieved February 18, 2011, from
http://nakedsecurity.sophos.com/2011/01/07/app-store -
developers-leave-purchased-apps-vulnerable-to-piracy/
Symbian Freak. (2011). S60 3
rd
ed. FP1 Hacked!
Retrieved February 18, 2011, from http://www.
symbian- freak.com/news/008/03/s60_3
rd
_ed_has_
been_hacked.htm
Theoharidou, M., Xidara, D., Gritzalis, D. (2008). A Com-
mon Body of Knowledge for Information Security and
Critical Information and Communication Infrastructu-
re Protection. International Journal of Critical Infra-
structure Protection, 1(1), 81-96.
Weiser, M. (1991). The computer for the 21st century.
Scientific American, 265 (3), 94-104.
SECRYPT 2011 - International Conference on Security and Cryptography
36