The theoretical foundation of the meta-market under BYOD settings has been presented in:
- A. Armando, G. Costa, A. Merlo, and L. Verderame. Formal modeling and automatic enforcement of bring your own device policies. International Journal of Information Security, pages 1--18, Aug. 2014. [ DOI | .pdf ]
- A. Armando, G. Costa, A. Merlo, and L. Verderame. Enabling byod through secure meta-market. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '14, pages 219--230, New York, NY, USA, July 2014. ACM. [ DOI | .pdf ]
- A. Armando, G. Costa, L. Verderame, and A. Merlo. Securing the “bring your own device” paradigm. IEEE Computer, 47(6):48--56, 2014. [ DOI | .pdf ]
- A. Armando, G. Costa, A. Merlo, and L. Verderame. Securing the “bring your own device” policy. Journal of Internet Services and Information Security (JISIS), 2(3/4):3--17, 2012. [ .pdf ]
Furthermore, the meta-market approach has been validated against a set of 860 applications taken from the Google Play application sore. The results are reported in this table. Other experiments can be found in this page.