期刊文献+

智能移动终端的信任管理技术研究 被引量:4

Research on Technology of Trust Management for Intelligent Mobile Terminal
下载PDF
导出
摘要 近年来,智能移动终端在迅速发展和普及的同时也带来了越来越多的安全问题,尤其是对这些终端设备的信任管理问题。概要介绍了智能移动终端技术发展特点,以及对于安全研究的需求;重点介绍了信任管理的基本概念、特点及模型分类;最后讨论了在智能移动终端环境中应用不同信任管理模型以及需要注意的问题,并以手机终端为例提出了一个基本管理模型,为更进一步的研究提供借鉴。 Recently, the security problem of intelligent mobile terminals is getting more and more attention, especially the problem of trust management. The technology improvement of intelligent mobile terminals and the requirement of security are introduced. The basic concept and models of trust management are elaborated. The application of different trust management models in the environment for intelligent mobile terminals is discussed, and a basic trust management model for mobile phones as an example is shown, which can provide reference for further research.
出处 《中国电子科学研究院学报》 2011年第6期567-570,共4页 Journal of China Academy of Electronics and Information Technology
关键词 智能 移动终端 安全 信任管理 intelligent mobile terminal security trust management
  • 相关文献

参考文献6

  • 1RINDEBACK C, GUSTAVSSON R. Why Trust is Hard- Challenges in E-mediated service[ C]. In Proc. of the 7^th International Workshop on Trust in Agent Society, New York, NY, USA, 2003:180-199.
  • 2HARTMAN F. The Role of Trust in Technology Innovation [C]. In Proc. Of the IEEE International Conference on Indus- trial Informatics ( INDIN 2033), Banff, Canada,2003 : 8-14.
  • 3BLAZE M, FEIGENBAUM J, LACY J. Decentralized Trust Management [ C ]. In : Dale J, Dinolt G, eds. Proceedings of the 17^th Symposium on Security and Privacy. Washington: IEEE Computer Society Press, 1996:164-173.
  • 4THEODORAKOPOULOS G, BARAS JS. On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks. IEEE Journal on Selected Areas in Communications, 2006,24 (2) :318-328.
  • 5李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 6王衡军,王亚弟,张琦.移动Ad Hoc网络信任管理综述[J].计算机应用,2009,29(5):1308-1311. 被引量:1

二级参考文献32

共引文献136

同被引文献29

  • 1颜菲,任江春,戴葵,王志英.基于TNC的安全认证协议的设计与实现[J].计算机工程,2007,33(12):160-162. 被引量:10
  • 2Enck W, Ongtang M, McDanid P. Understanding an- droid security [ J ]. IFEE Security and Privacy, 2009, 7 (1) : 50--57.
  • 3William Enck, Darnien Octeau, Patrick McDaniel, et al. A study of android application security[-R]. USENIX Se- curity Symposium, 2011.
  • 4Moharnmad Nanrnan, Sohail Khan, Xinwen Zhang, et al. Beyond kernel-level integrity measurement: Enabling re- mote attestation for the android platform[C]//Proceedings of the 3rd International Conference on Trust and Trustwor- thy Computing Berlin, Heidelberg, 2010:1 - 15.
  • 5Zhang Xinwen, Onur Acticmez, Jeanpierre Seifert. Build- ing efficient integrity t and attestation for mo- bile phone platforms [ J ]. Security and Privacy in Mobile Information and Communication Systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009(17) :71 - 82.
  • 6Asaf Shabtal, Yuval Fledel, Uri Kanonv. Google Android: A comprehensive security asssment [J ]. IEEE Security and Privacy, 2010, 8(2):35-44.
  • 7Sailer R, Zhang Xiaolan, Jaeger T, et al. Design and im- plementation of a TCG-based integrity measurement archi- tecture[ C] //Proceedings ot" USENIX Security Symposium. California, 2004:223 - 238.
  • 8Jaeger T, Sailer R, Shankar U. PRIMA: Policy-reduced integrity measurement architecture[ C] //Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, California, 2006:19- 28.
  • 9Trusted Computing Group. mobile trusted module specification version 2.0 [ EB/OL ]. http://www, trusted - computinggroup, org/resources/mobile_ trusted_ module_ 20_ use_ cases, 2011.
  • 10李建,何永忠,徐开勇.基于信任度量的软件下载服务框架[J].武汉大学学报(信息科学版),2008,33(10):1062-1066. 被引量:3

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部