期刊文献+

移动互联网业务信息安全

Mobile Internet Information Security
原文传递
导出
摘要 从互联网时代的全球化普及,到电信化技术的地毯式推广,便捷的体验已经让移动互联网成为了人们必不可少的依靠,但是随着美国棱镜丑闻的曝光,关于移动互联网的信息安全问题就成为了全球所关注的焦点。如何有针对性的对移动互联网进行全方位安全评估分析,并适时调整策略,通过一系列立法措施加强移动互联网络的安全,这都成为保障信息安全的重要议题。 In the era of globalization from the popularity of the Intemet, telecommunications technology to promote the carpet, convenient experience has made mobile Internet has become essential to rely on people, but as the U.S. prism scandals, about the mobile Internet Information Security issue has become the focus of global concern. How targeted towards mobile Intemet comprehensive security assessment analysis, and adjust the strategy, through a series of legislative measures to strengthen the security of mobile Intemet, which have become an important information security issues.
作者 石良
出处 《网络安全技术与应用》 2013年第8期140-141,共2页 Network Security Technology & Application
关键词 移动互联网 运营模式 安全策略 mobile Intemet operating mode security policy
  • 相关文献

参考文献3

二级参考文献169

  • 1[7]Chen W T, Huang L C. RSVP mobility support: a signaling protocol for integrated services internet with mobile hosts [A]. In: IEEE INFOCOM00[C]. Israel, 2000. 1283-1292.
  • 2[8]Mirhakkak M, Schult N, Thomson D. Dynamic bandwidth management and adaptive applications for a variable bandwidth wireless environment [J]. IEEE JSAC, 2001, 19(10):1984-1997.
  • 3[9]Misra A, Das S, Mcauley A, et al. Integrating QoS support in TeleMIP's mobility architecture [A].In: Proc of IEEE International Conference on Personal Wireless Communications [C]. Hyderabad, India, 2000.57-64.
  • 4[10]Conforto P, Tocci C, Losquadro G,et al. Global mobility and QoS provision for internet services: the SUITED solution[A]. In: Proc of IEEE Globecom 2000 [C]. San Francisco, USA, 2000.3-12.
  • 5[11]Hong D, Rappaport S S. Traffic model and performance analysis for cellular mobile radio telephone system with prioritized and non-prioritized handoff procedures [J]. IEEE Transactions on Vehicular Technology, 1986, 35(3):77-92.
  • 6[12]Levine D A, Akyildiz I F, Naghshineh M. A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept [J]. IEEE/ACM Trans on Networking, 1997, 5(1):1-12.
  • 7[13]Aljadhai A R, Znati T. Predictive mobility support for QoS provisioning in mobile wireless environment [J]. IEEE JSAC, 2001, 19(10):19151930.
  • 8[14]Choi S, Shin K G. Adaptive bandwidth reservation and admission control in QoS-sensitive cellular network [J]. IEEE Trans on Parallel and Distributed System, 2002, 13(9):882897.
  • 9[15]Madarressi A R, Mohan S. Control and management in next generation networks: challenges and opportunities [J]. IEEE Commun Mag, 2000, 38(10):94102.
  • 10[1]Perkins C. IP mobility support[EB/OL].http://www.ieft.org/rfc/rfc2002.txt? nubmer=2002.1996-10/2003-03-20.

共引文献273

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部