期刊文献+

移动终端操作系统安全测评工具实现 被引量:7

Implementation of Security Evaluating Tool for Mobile Intelligent Terminal Operating System on Android Operating System
原文传递
导出
摘要 对移动智能终端操作系统安全进行测评是保证移动终端安全和移动互联网安全的基石。为了实现移动智能终端操作系统安全的自动化测评,结合目前的计算机以及移动终端操作系统安全标准和分级安全测评方法,并结合移动智能终端自身特点,提出了一个移动智能终端安全功能测试模型,并在目前流行的Android操作系统上实现了基于该测试模型的自动测评工具,对Android操作系统的部分安全功能进行了测评。该方法有利于移动智能终端安全测评系统的研制。 The assessment of intelligent mobile terminal operating system security is the foundation for ensuring the mobile terminal security and mobile Internet security. In order to realize the security automatic evaluation of intelligent mobile terminal operating system, this paper, in combination of the computer and the mobile terminal operating system safety standards and the classified security assessment method, including the characteristics of mobile intelligent terminal, proposes the design and realization of security function of the automatic evaluation tool based on the security function assessment model. This tool is successfully used to evaluate part of security function on Android, the current popular intelligent operating system. This method is helpful to developing the security evaluation system of multiple platform mobile intelligent terminals
出处 《信息安全与通信保密》 2013年第3期63-65,69,共4页 Information Security and Communications Privacy
基金 自然科学基金项目(批准号:61032003 61071100和61271172) 四川省科技条件平台项目(编号:2011KJPT01) 四川省应用基础研究项目(编号:2012JY0001) 成都市科技计划项目(编号:12DXYB026JH-002)联合资助
关键词 移动智能终端 操作系统 安全测评 自动测评 mobile intelligent terminal operating system security evaluation automatic evaluation
  • 相关文献

参考文献11

  • 1YD/T1699-2007,移动终端信息安全技术要求[S].
  • 2YD/T1700-2007,移动终端信息安全测试方法[S].
  • 3JANSEN Wayne, SCARFONE Karen. Guidelines on Cell Phone and PDA Security[R]. Gaithersburg: NIST Special Publication, 2010.
  • 4GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 5SONGTAO Z, DEAN T, KNIGHT S. A Lightweight Approach to State Based Security Testing[C]//Proc. of IBM Centre for Advanced Studies Conference. NJ, United States: IBM Corp. Riverton, 2010: 28.
  • 6吕世超,文红,韩祺祎.多天线广播信道模型安全性分析[J].信息安全与通信保密,2011,9(8):50-53. 被引量:12
  • 7李建强,吕世超,任梦吟,范杰,文红.局域网即时通信监控系统的研究与实现[J].信息安全与通信保密,2012,10(8):116-118. 被引量:5
  • 8杨玲,宋时立,刘国超,陈霄,文红.LT码的性能分析及仿真[J].通信技术,2012,45(5):1-3. 被引量:7
  • 9MALLOULI W, ORSET J-M, CAVALLI A. A Formal Approach for Testing Security Rules[C]//Pr. of SACMAT'07. NY, United States: ACM New York, 2009: 127-132.
  • 10魏丕会,卿斯汉,黄建.安全操作系统等级评测系统[J].计算机工程,2003,29(22):135-137. 被引量:5

二级参考文献28

  • 1段立娟.Web挖掘的敏感信息过滤模型[J].信息安全与通信保密,2007,29(1):69-71. 被引量:9
  • 2[1]DoD 5200.28-STD.Trusted Computer System Evaluation Criteria.U.S. Department of Defense, 1985-12
  • 3[2]CCIMB-99-031.Common Criteria Security Evaluation for Information Technology, V2. 1. 1999-08
  • 4CHOI Lai-U, MURCH Ross D. A Transmit Preprocess-sing Technique for Multi-user MIMO Systems using a Decomposition Approach[J]. IEEE Transactions on Wireless Communication, 2004, 03(1): 20-24.
  • 5WOLNIANSKY P, FOSCHINI G, GOLDEN G, et al. V-BLAST: An Architecture for Realizing Very High Data Rates over the Rich Scattering Wireless Channel[C]. [s.l.] : Proc.ISSSE, 1998 : 295-300.
  • 6STANKOVIC V, HAARDT M. Generalized Design of Multi User MIMO Precoding Matrices[J]. IEEE Transactionson Wireless Communication, 2008(7): 953-961.
  • 7SPENCER Q, HAARDT M. Capacity and Downlink Transmission Algorithms for a Multi-user MIMO Channel[C]//36th Asilomar Conference Signals, Systems, and Computers. Pacific Grove, CA : IEEE Computer Society, 2002: 1384-1388.
  • 8SPENCER Q, SWINDELHURST A L, HAARDT M. Zeroforcing Methods for Downlink Spatial Multiplexing in Multi-user MIMO Channels[J]. IEEE Transactions on Signal Process, 2004, 52: 461-471.
  • 9LIU R, POOR H V. Secret Capacity Region of a Multi-Antenna Ganssian Broadcast Channel with Confidential Message[J]. IEEE Transactions on Information Theory, 2009, 55(3): 1235-1249.
  • 10LUBY M.LT Codes[M].USA:ACM,2002:6-7.

共引文献74

同被引文献38

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 4YD/T1699-2007,移动终端信息安全技术要求[S].
  • 5YD/T1699-2007,移动终端信息安全技术要求,2006[S].
  • 6YD/T1700-2007,移动终端信息安全测试方法,2006[S].
  • 7JAESEN W, SCARFONE K. Guidelines on Cell Phone and PDA Security[R]. National Institute of Standards and Technology(NIST) Special Publication, October 2010.
  • 8DAGON C, MARTIN T, STARNER T. Mobile Phones as Computing Devices: the Viruses Are Coming[J]. IEEE Pervasive Computing, 2004(3): 11-15.
  • 9GARY M, BRUCE P. Software Security Testing[J]. IEEE Security and Privacy, 2008, 2(5): 81-85.
  • 10YDT1700-2007,移动终端信息安全测试方法[S].

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部