摘要 |
Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. |