期刊文献+

移动业务安全防范技术研究与开发 被引量:2

Mobile Security Technology Research and Development
下载PDF
导出
摘要 随着移动终端及其应用的快速发展,企业开始部署或考虑部署支持移动方式访问的应用程序,以实现高效的办公流程和资源共享。汕头供电局紧跟移动技术的发展步伐,正在将传统的业务扩展到了移动终端上,方便用户进行业务处理及移动办公,但局方用户的移动终端型号及操作系统多种多样,缺少统一的管理手段,存在安全缺陷。而通过移动终端安全接入及管理系统的建设,实现移动终端的统一接入、移动终端的统一管理、移动终端的数据安全保护以及接入链路安全等功能,将帮助汕头局实现移动设备集中控制、统一管理;帮助企业实现移动设备的终端安全。 With the rapid development of mobile terminals and its applications, companies are deploying or considering to deploy support for mobile access to applications, in order to achieve efficient office processes and resource sharing. Shantou Power Supply Bureau, keeping up to the pace of development of mobile technology, has been extending the traditional business to the mobile terminal. But lack of unified management tool, there are a lot of security flaws. And through the construction of mobile terminals and secure access management system, the Shantou Power Supply Bureau can achieve unified access the mobile terminal, unified management of mobile terminals, data security and access link security. The system will help Shantou Power Supply Bureau achieve mobile devices centralized control, unified management and help companies achieve mobile devices endpoint security.
作者 黄小奇
出处 《机电工程技术》 2014年第9期144-147,共4页 Mechanical & Electrical Engineering Technology
关键词 移动业务 安全防范 安全管理 mobile services security protection security management
  • 相关文献

参考文献6

二级参考文献12

  • 1胡继军.电力企业IT运维生产化探讨[J].广西电力,2006,29(6):16-19. 被引量:2
  • 2[1]Bon Jan Van,Kemmerling George,Pondman Dick.IT Service Management-An Introduction[M].Amsterdam:Van Haren Publishing,2002:20~ 30
  • 3[2]OGC.Best Practices in Infrastructure ManagementBaseline Research Report[R].OGC 2001.
  • 4[3]Donna Scott.IT Operations Management is Undergoing Transformation[R].Gartner,2003.
  • 5[4]Gibson Rick.Global Information Technology Architectures[J].Journal of Global Information Management,1994(4):11 ~28
  • 6[5]Duncan Nancy Bogucki.Capturing Flexibility of Information Technology Infrastructure:A Study of Resource Characteristics and Their Measure [J].Journal of Management Information Systems,1995(12):21~37
  • 7[6]Broadbent M,Weill P.Strategic Context and Patterns of IT Infrastructure Capability[J].Journal of Strategic Information Systems,1999(8):157~187
  • 8[7]Terry Anthony Byrd,Douglas E.An Exploratory Examination of the Relationship Between Flexible IT Infrastructure and Competitive Advantage[J].Information & Management,2001 (7):41 ~ 52
  • 9四木.ITIL及其实施步骤.[EB/OL].2005-06.http://www2.ccw.com.cn/04/0424/b/0424b04-1.asp.
  • 10孙强,刘小宁.实施IT服务管理--路在脚下[EB/OL].2004-08.http://www.ccidcom.com/weekly/news/39/200483114920.htm.

共引文献51

同被引文献8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部