期刊文献+

移动数据的安全威胁和解决方案研究

Review of Mobile Data Security Threats and Solutions
下载PDF
导出
摘要 文章展示不同的移动数据可能在现实生活中发生的安全威胁,并提供了消除它们的解决方案。移动数据是分布式系统的一个特殊类。由于移动数据应用的分布式特性和移动设备的硬件约束对于安全是个挑战。文章涉及的安全主题包含4个方面,包括:移动硬件设备的安全性、移动设备上的操作系统的安全性、移动数据的安全性和移动网络的安全性。文章确定在移动数据上有一系列安全漏洞,并尝试运用适当的技术,以减少对移动数据安全方面的影响。对于移动硬件设备,文章将讨论影响移动数据的安全性的可能的解决方案,主要分为移动硬件设备、移动操作系统和移动网络的安全问题。最后,对于更多的安全,文章提供了可应用于分布式数据的全面解决方案。 This article showes different mobile database security threats that may be occurs for mobile database in the real world and gives possible solution to eliminate them. Mobile database is a specialized class of distributed systems. There are security challenges due to the distributed nature of the mobile database application and the hardware constraints of mobile devices. In this document,we will deal with the subject of security in four fields. These four areas include: security of mobile device,security of operating system on mobile device,security of mobile database and security of mobile network. We identify a set of security vulnerabilities on mobile database and try to apply appropriate technique to decrease side affect for mobile database security. Important security issues for mobile device,mobile operating system and mobile network that maybe affect on mobile database security are discussed along with possible solution. Finally,for more security,this paper offers a comprehensive solution that may be applied to distributed database.
作者 金龙 邵彤
出处 《无线互联科技》 2015年第24期23-26,共4页 Wireless Internet Technology
关键词 移动数据 安全策略 移动网络 moblie database security Policies moblie network
  • 相关文献

参考文献3

二级参考文献10

  • 1刘衍衍.计算机安全技术[M].长春:吉林科学技术出版社,1997..
  • 2[1]V Paxson. Bro: A system for detecting network intruders in real-time. USENIX Association, 1998, 1(1): 31~51
  • 3[2]K Huang, Z W Xu. Scalable Parallel Computing. Hongkong: China Machine Press, 2000
  • 4[3]D D Clark, S Shenker, L X Zhang. Supporting real-time applications in an integrated services packet network architecture and mechanism. Proc of ACM SIGCOMM, Baltimore, Maryland, USA, 1992
  • 5[4]A Demers, S Keshavt, S Shenker. Analysis and simulation of fair queuing algorithm. Proc of ACM SIGCOMM, Austin, TX, USA, 1989
  • 6[5]G Varghese, M Shreedar. Efficient fair queuing using deficit round robin. Proc of ACM SIGCOMM, Cambridge, MA, USA, 1995
  • 7[6]S Floyd, V Jacobson. Link-sharing and resource management models for packet network. IEEE/ACM Trans on Networking, 1995, 3(4): 365~386
  • 8[7]I Stoica, S Shenker, H Zhang. Core-stateless fair queuing: Achieving approximately fair bandwidth allocations in high speed networks. Computer Communication Review, 1998, 28(4): 118~130
  • 9[8]C Kruegel, F Valeur, G Vigna et al. Stateful intrusion detection for high-speed networks. In: Proc of the 2002 IEEE Symp on Security and Privacy. Los Alamitos, California: IEEE Computer Society Press, 2002. 285~294
  • 10[9]N F Puketza, K Zhang, M Chung et al. A methodology for testing intrusion detection systems. IEEE Trans on Software Engineering, 1996, 22(10): 719~729

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部