期刊文献+

一种细粒度的移动数据安全保护模型

A Fine-Grained Mobile Data Security Model
下载PDF
导出
摘要 提出一种细粒度的移动数据安全保护模型,通过在智能终端和移动接入网关/服务器处针对移动数据、移动应用进行标记,对移动数据的操作进行控制,达到移动数据安全隔离的目的,进而实现对移动数据细粒度的安全管理功能。模型由移动数据管理模块和标签控制管理模块组成。移动数据管理模块根据标签识别用户权限和数据保密级别,对移动数据的移动应用进行操作控制;标签控制管理模块对数据标签和应用标签的生成、修改、存储和传输进行控制管理。对模型的移动智能终端侧进行了实验,证明模型能对移动数据进行细粒度的保护。 A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. Thus fine-grained security for mobile data management capabilities were achieved. The model was consisted of mobile data management module and the label control management module. The mobile data management module identified the user permissions and level of data privacy through the label to control the operation of mobile application of mobile data. The creating, modifying, storing and transmitting of the data label and application label were controlled and managed by the label control management module. Experiments on the Android device were carried out, and the security of the model was confirmed.
出处 《电信科学》 北大核心 2014年第1期15-23,30,共10页 Telecommunications Science
关键词 细粒度 移动数据 标签 数据安全 fine-grained, mobile data, tag, data security
  • 相关文献

参考文献8

  • 1杨卫军,秦海权.智能移动平台安全威胁分析[J].警察技术,2013(1):45-47. 被引量:2
  • 2陆宏亮.移动云环境下基于终端上下文信息的数据保护研究.国防科学技术大学硕士学位论文,1998.
  • 3石莎.移动互联网络安全认证及安全应用中若干关键技术研究.北京邮电大学硕士学位论文,2012.
  • 4杜久升,陈宜金.移动数据传输安全性研究[J].计算机工程与应用,2011,47(34):11-14. 被引量:2
  • 5Butter T, Aleksy M. MixVM-An approach to service isolation anddata protection in mobile context-sensitive applications. Proceedingsof 2009 International Conference on Availability, Reliability andSecurity, ARES 09, Fribourg, Switzerland, 2009:322-328.
  • 6Nkosi M, Mekuria F. Improving the capacity, reliability & life ofmobile devices with cloud computing. Proceedings of IST-AfricaConference, South Africa, 2011:1-9.
  • 7Wonjoo P, Sun J K, Kee S. Framework for security managementof mobile devices. Proceedings of Communications and InformationTechnology, ISCIT 2009,Korea, 2009:1219-1222.
  • 8Wu J J, Zhou J,Ma J, et al. An active data leakage preventionmodel for insider threat. Intelligence Information Processing andTrusted Computing (IPTC), 2011(2):39-42.

二级参考文献8

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部