期刊文献+

基于Android系统的手机信息安全分析及策略改进

The Information Security Analysis and Strategy Improvement of Android Mobile Phone
下载PDF
导出
摘要 随着移动互联网的发展,Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书,然后提出Android系统存在的安全问题,最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。 With the development of mobile Internet,mobile phones using Androidsystem occupy a large share in the market.First of all,this paper analyzes sandbox model and digital certificate which are the existing security mechanisms of Androidsystem.Secondly,security problems in the Androidsystem have been put forward.Finally,security strategies are designed from two angles of system developers and users to improve the existing security strategy.
作者 贾能
出处 《无线互联科技》 2016年第7期1-2,共2页 Wireless Internet Technology
关键词 ANDROID 智能手机 信息安全 安全策略 Android mobile phone information security security strategy
  • 相关文献

参考文献2

二级参考文献16

  • 1[4]CSC-STD-001-83-1983,Trusted computer system evaluation criteria[S].
  • 2[5]CCIMB-99-031-1999,Common criteria for information technology security evalution[S].
  • 3网秦.2011年中国大陆地区手机安全报告[R/OL].2012-01-12.http://www.netqin.com/upLoad/File/baogao/20120112.pdf.
  • 4Enck W.Defending Users against Smartphone Apps: Tech-niques and Future Directions [ C]//Proc.of the 7 th Interna-tional Conference on Information Systems Security.Berlin:Springer-Verlag ,2011:49-70.
  • 5谷歌.Androidand Security [ R/OL].2012.http;//goog-lemobile.blogspot.com/2012/02/android-and-security,ht-ml.
  • 6Grace M,Zhou Y,Wang Z,et al.Systematic detection of capa-bility leaks in stock Android smartphones [ C] //Proceedings ofthe 19th Annual Symposium on Network and Distributed Sys-tem Security.Hilton San Diego Resort & Spa,San Diego,Cali-fornia :[s.n.] ,2012.
  • 7Felt A P,Chin E,Hanna S,et al.Android permissions demysti-fied [C] //Proceedings of the 18th ACM Conference on Com-puter and Communications Security,[s.l.] : ACM,2011:627-638.
  • 8Enck W,Gilbert P,Chun B G,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smar-tphones [ C]//Proceedings of the 9th USENIX conference onoperating systems design and implementation.San Francisco :USENIX Association,2010 : 1-6.
  • 9Nauman M,Khan S,Zhang X.Apex:extending android permis-sion model and enforcement with user-defined runtime con-straints [C] //Proceedings of the 5th ACM Symposium on In-formation ,Computer and Communications Security.[ s.1.]:ACM,2010 ;328-332.
  • 10宋杰,党李成,郭振朝,赵萌.Android OS手机平台的安全机制分析和应用研究[J].计算机技术与发展,2010,20(6):152-155. 被引量:69

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部