期刊文献+

可信移动平台软件安全载入策略模型研究 被引量:7

Study of Policy Model of Software Secure Loading for Trusted Mobile Platform
下载PDF
导出
摘要 针对手机卧底等木马软件通过软件下载的途径安装到用户手机,使手机用户的隐私受到了巨大的威胁的实际。通过分析目前软件下载方案中存在的安全问题及产生的根源,提出移动终端软件载入的控制策略,建立了策略模型,采用形式化的描述与分析,并从可信移动平台技术的角度,设计软件载入策略的实现方案,对模型和方案进行安全性分析,结果证明,该方案能有效地防范手机卧底等恶意软件的侵入。 Aiming at the fact that Xwodi, a kind of Trojan software, is fit in the users handsets by downloading software and threatens the privacy of user deadly, With analyzing security fault and cause in the solution of current software download. This paper puts forward the control policy for mobile equipment for downloading software, sets up politic model, carries out formalized description and analysis, designs implementing scheme of software loading policy from point of view of trusted mobile platform and makes security analysis for the model. Result indicates that the scheme can prevent Xwodi from being intruded effectively.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第2期148-150,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z440)
关键词 移动平台 可信计算 安全分析 mobile platform trusted computing security analysis
  • 相关文献

参考文献7

  • 1Pisko E, Rannenberg K, Roβnagel H. Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests[J]. Datenschutz and Datensicherheit, 2005, 9(29): 526-530.
  • 2谢俊杰,孟利民.软件无线电的软件下载与安全策略[J].计算机与数字工程,2006,34(5):24-26. 被引量:2
  • 3Cook P G. Wireless Software Download Security[EB/OL]. (2006-06-14). http://www.sdfforum.org/uploads/pub_17683004_i_0069_v0_00_ wireless_securit y_06_14 04.pdf.
  • 4Gehrmann C, Stahl E Mobile Platform Security[EB/OL]. (2006-02-16). http://www.eric s son.com/ericsson/corpinfo/publicationns/review/2006_ 02/03.sbtml.
  • 5Hoffmeyer J, Park I, Majmundar M. Radio Software Download for Commercial Wireless Reconfigurable Devices[J]. IEEE Radio Communications, 2004, 42(3): 26-32.
  • 6Aissi S, Maruyama H, Miura E et al Trusted Mobile Platform Protocol Specification Document[EB/OL]. (2004-04-05). http:// www.trusted-mobile.org/TMP Protocol_rev 1 _00.pdf.
  • 7陈泽茂,沈昌祥.基于操作系统安全的计算机病毒防御策略[J].武汉理工大学学报,2004,26(9):75-77. 被引量:4

二级参考文献10

  • 1Cohen Fred. Computer Viruses: Theory and Experiments[J]. Computers and Security,1987,6(1):22~35.
  • 2Biba K J. Integrity Considerations for Secure Computer Systems[R].Bedford:USAF Electronic Systems Division,1977.
  • 3Bell D E, LaPadula L J. Secure Computer Systems: Mathematical Foundations[R].Bedford:USAF Electronic Systems Division,1973.
  • 4Saltzer Jerome H, Schroeder Michael D. The Protection of Information in Computer Systems[J]. Proceedings of the IEEE,1975,63(9):1278~1308.
  • 5Peter G. Cook. Wireless Software Download Security [M].2004,6
  • 6Security Considerations for Operational Software for Software Defined Radio Devices in a Commcrcial Wireless Domain, DL SIN Document SDRF-04 - A - 0010 - V0.0 Ballot Version[DB/OL]. http://www.sdrforum.org, 2004
  • 7SDR Forum (2002 b) .Requirements for Radio Software Download for RF Reconfiguration, SDR Forum Document SDRF- 02- A - 0007[DB/OL]. http://www. sdrforum.org 2002, 11
  • 8Software Defined Radio Forum Security & Architecture Working Group SDR System Security S&A- SEC Document No,SDRF - 02 - A - 0006 - V0.00[DB/OL]. http://www.sdrforum.org.
  • 93GPP (2001a).3G Security - Security Principles and Objectives[ DB/OL]. 3GPP TS 33.120 v4.0.0,2001,3
  • 10M Sugita, K Uehara, S Kubota. Flexible Security Systems and a New Structure for Electronic Commerce On Software RadioC[C]. 52nd IEEE Vehicular Technology Conference Proceedings, 2000,6

共引文献4

同被引文献70

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部