期刊文献+

一种扩展的Android应用权限管理模型 被引量:9

An Extended Android Application Permission Management Model
下载PDF
导出
摘要 现有Android移动操作系统不支持用户自由分配已安装的应用权限。为解决该问题,提出一种细粒度的Android应用权限管理模型。该模型在保证系统安全性的前提下,对现有Android应用权限机制的框架层和应用层进行修改和扩展,使用户可以通过GUI界面按需分配系统中已安装的应用权限。实验结果表明,该模型能满足用户的Android应用权限管理需求,并且系统性能损失较小。 As existing Android system does not support users to customize the permissions of applications in it,this paper extends the existing Android application permission management mechanism,and proposes a fine-grained Android application permission management model compared to the existing application permission management ability.It retains the existing Android security mechanism,and users can freely customize the permissions of applications that are installed in it through the friendly GUI.Experimental results show that the model can provide users a practical and fine-grained Android application permissions management function,and it has less loss of the system performance.
作者 鲍可进 彭钊
出处 《计算机工程》 CAS CSCD 2012年第18期57-60,64,共5页 Computer Engineering
关键词 安卓 移动操作系统 移动安全 权限控制 安全机制 组件间通信 Android; mobile operating system; mobile security; permission control; security mechanism; inter-components communication
  • 相关文献

参考文献8

  • 1Android in Wikipedia Site[EB/OL]. (2008-04-13). http://en.wiki pedia.org/wiki/Android_(operating_system).
  • 2Enck W, Ongtang M, McDaniel P, et al. Understanding Android Security[J]. IEEE Security and Privacy Magazine, 2009, 7(1): 50-57.
  • 3陈汉章,张玉清.访问控制框架及其在Linux中的应用研究[J].计算机应用研究,2007,24(4):217-219. 被引量:5
  • 4Nauman M, Khan S. Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform[J]. International Journal on Artificial Intelligence Tools, 2010, 8(4): 440-472.
  • 5蔡罗成.Android后台监听实现机制浅析[J].信息安全与通信保密,2010,7(6):39-41. 被引量:31
  • 6Shabtai A, Fledel Y, Kanonov U, et al. Google Android: A Comprehensive Security Assessment[J]. IEEE Security and Privacy Magazine, 2010, 8(2): 35-44.
  • 7Ongtang M, McLaughlin S, Enck W, et al. Semantically Rich Application-centric Security in Android[C]//Proceedings of the Annual Computer Security Applications Conference. [S. l.]: IEEE Press, 2009.
  • 8Android’s Official Building Tutorial by Google[EB/OL]. (2010- 07-16). http://source.android.com/source/building.html.

二级参考文献11

  • 1Google Android Team.Android SDK 1.5 r2 Reference[EB/OL].(2009-06-30)[2010-1-17].http://developer.android.com.
  • 2高焕堂.OPhone应用开发雕龙小技[EB/OL].(2010-03-04)[2010-03-15].http://dev.chinamobile.com/cmdn/bbs/ viewthread.php?tid=10567.
  • 3SPENCER R, SMALLEY S, LOSCOCCO P, et al. The Flask security architecture: system support for diverse security policies: proceedings of the 8th USENIX Security Symposium [ C ]. Berkeley: USENIX Press, 1999 : 123-139.
  • 4[ EB/OL]. http ://www. nsa. gov/selinux/info/docs.cfm.
  • 5WRIGH C, COWAN C, MORRIS J, et al. Linux security modules:general security support for the Linux kernel: proceedings of the 11 th USENIX Security Symposium[ C]. San Francisco: [ s. n], 2002.
  • 6OTT A. The rule set based access control(RSBAC) Linux kernel security extension[ C/OL]//The 8th International Linux Kongress, Enschede ( 2001-11- 30 ). http://www. rsbac. org/linux-kongress/index. html.
  • 7LAMPSON B W. Dynamic protection structures: proceedings of the AFIPS Fall Joint Computer Conference, volume 35 [ C ]. Las Vegas:[s.n. ], 1969:27-38.
  • 8ANDERSON J P. Computer security technology planning study volume Ⅱ, ESD-TR-73-51 [R]. Bedford: Electronic Systems Division, Air Force Systems Command, Hanscom Field, 1972.
  • 9ISO/IEC 10181-3 Information technology : open systems interconnection security frameworks for open system: access control framework[ S]. Geneva: ISO/IEC, 1996.
  • 10ABRAMS M D,LAPADULA L J,EGGERS K W,et al. A generalized framework for access control: an informal description: proceedings of the 13th National Computer Security Conference [ C ]. Wahington D.C:[s. n] , 1990:135-143.

共引文献34

同被引文献73

引证文献9

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部