期刊文献+

从GMIC会议看移动互联网安全 被引量:3

From GMIC Viewing the Mobile Internet Security
原文传递
导出
摘要 全球移动互联网大会(Global Mobile Internet Conference,GMIC)是全球领先的移动互联网行业年度盛会。2013年在北京召开的第五届全球移动互联网大会将"重新定义移动互联网"作为大会主题。文中分析了大会主题提出的背景及其现实意义,思考移动互联网安全必须随之重新定义的原因,并在此基础上探讨了移动互联网安全出现的新态势、新技术,最后对移动互联网的安全提出了未来的发展思路和建议。 GMIC(the Global Mobile Internet Conference)is the premier event for mobile companies interested in expanding their network and learning market trends in Asia, the United States, and markets worldwide. "Transforming mobile Internet" is the theme of GMIC Beijing 2013. This paper analyzes the background of the proposed theme and its practical significance. With this theme, the reasons for redefining mobile Internet security are explored, the new development and the novel technologies of the mobile Internet security discussed, and fiwally the ideas and suggestions for the future development of mobile Internet security are proposed.
出处 《信息安全与通信保密》 2013年第8期42-44,共3页 Information Security and Communications Privacy
关键词 移动互联网 安全 可信计算 手机虚拟化 移动目标防御 mobile Internet security trusted computing mobile virtualization moving target defense
  • 相关文献

参考文献2

二级参考文献16

  • 1高常波,罗万伯,王科.计算机网络安全系统设计[J].通信技术,2003,36(3):46-47. 被引量:4
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3张涛.可信网络连接(TNC)架构的应用研究[J].电脑知识与技术,2005(11):24-26. 被引量:1
  • 4Trusted Computing Group.TCG specification architecture over-view[EB/OL].http://www.trustedcomputinggroup.org/,2004.
  • 5Microsoft.Trusted platform module services in windows long- horn [EB/OL] .http://www.microsoft.com/resources/ngscb/, 2005.
  • 6Intel Corporation.LaGrande technology architectural overview [EB/OL].http://www.intel.com/technology/security/,2005.
  • 7Trusted Computing Group. TPM main design principles [EB/ OL].2003.8.http://www.trustedcomputinggroup.org/.
  • 8Trusted Computing Group.Trusted network connect architecture for interoperability [EB/OL] .http://www.trustedcomputinggroup. org/,2007.
  • 9DoCoMo,IBM,Intel Corporation.Trusted mobile platform hard- ware architecture description[R].2004.
  • 10DoCoMo,IBM,Intel Corporation.Trusted mobile platform soft- ware architecture description[R].2004.

共引文献27

同被引文献22

  • 1Cybercrime:This is War. J. P[OL]. Morgan https://www. jp-morgan. com/tss/General/Cybercrime _ This _ Is _ War/1320514323773.
  • 2李柏歲.iOS平台的软件安全性分析[D].上海:上海交通大学,2011.
  • 3Becher M,Freiling F C, Hoffmann J. Mobile Security CatchingUp. Revealing the Nuts and Bolts of the Security of Mobile De-vice[C] // 2011 IEEE Symposium on Security and Privacy.2011:96-111.
  • 4Guo C X, Wang Helen J, Zhu W W. Smart-Phone Attacks andDefenses [ OL]. http;//research, microsoft. com/en-us/um/people/helenw/ papers/smartphone, pdf.
  • 5Amrutkar C,Traynor P, Oorschot P V. An empirical evaluationof security indicators in mobile Web browsers [C] // IEEETrans. Mobile Computing,2013.
  • 62012 Norton Cybercrime Report[OL]. http://us. norton. com/cybercrimereport/prom.
  • 7Internet Security Threat Report 2014. Symantec. 2013 Trends,Volume 19,Published April 2014.
  • 8Jakobsson M. Why Mobile Security is not Like Traditional Se-curity[OL], http: //www. markus-jakobsson. com/wp-content/uploads/ fclljakobsson. pdf.
  • 9Enck W. Defending users against smartphone apps:Techniquesand future directions[C] // Proceedings of the 7 th InternationalConference on Information Systems Security (Kolkata, India,dec 2011). ICISS,2011.
  • 10Prospective Analysis on Trends in Cybercrime from 2011 to2020.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部