期刊文献+

基于Android平台的文档保护方案设计与实现

DESIGN AND IMPLEMENTATION OF DOCUMENT PROTECTION SCHEME BASED ON ANDROID PLATFORM
下载PDF
导出
摘要 近年来,随着Android平台在移动设备上的普及以及企业移动办公快速发展的趋势,Android平台上隐私文档的保护显得越发重要。基于已有文档保护方案的研究,提出一套可供普通应用程序使用的轻量级的移动终端文档保护方案。该方案使用多重密钥技术并结合密钥拆分算法,在保证文档安全性的同时,实现了对用户透明的文档加解密。该方案还可对受保护文档进行实时监控,以保证其在整个生命周期内的安全性。基于该方案在Android平台上实现了一个原型系统,并在多个Android手机平台上进行了测试,实验结果验证了该方案的可行性和兼容性。 As mobile devices of Android are becoming more and more prevalent among enterprises as well as the individuals,the protection of private documents on Android platform is getting more and more important. On the basis of existing researches,a lightweight mobile document protection scheme for general applications is proposed,which used the technology of key splitting and multiple-key system. The process of encryption and decryption is transparent to the user without any perceptible delay. The scheme provided real-time monitoring to protect the confidentiality of documents during the whole lifecycle. Moreover,a prototype system on Android platform has been implemented based on the scheme,and it had been tested on several Android platforms. Experiment results show that the scheme is practical and compatible with the mainstream Android platforms.
出处 《计算机应用与软件》 2017年第2期313-318,333,共7页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2013AA01A214)
关键词 文档保护 ANDROID 密钥拆分 文档监控 移动办公 Document protection Android Key split Document monitor Mobile office
  • 相关文献

参考文献5

二级参考文献44

  • 1Cowan C,Wagle P,Pu C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade.In:Proc.of the DAR PA In formation Survivability Conference and Expo,1999
  • 2Newsham T.Format String Attacks.Guardent,Inc.,http://www.guardent.com/docs/FormatString.pd f,2000-09
  • 3Rivest R.The MD4 Message-digest Algorithm.Network Working Group,RFC1320,1992-04
  • 4Rivest R.The MD5 Message-digest Algorithm.Network Working Group,RFCI321,1992-04
  • 5Kim G H,Spafford E H.The Design and Implementation of Tripwire:A File System Integrity Checker.Technical Report CSD-TR-93-071,Purdue University,Dept.of Cmputer Sciences,Purdue University,West Lafayette,IN 47907-1398,1993
  • 6Rajeev Nagar.Windows NT file system internals:a developer's guide[M].Cambridge:O'Reilly,1997.
  • 7Wright C P,Dave J,Zadok E.Cryptographic file systems performance:what you don't know can hurt you[A].Security in Storage Workshop,2003.SISW '03[C].Proceedings of the Second IEEE International 31-31 Oct.2003,47-47.
  • 8Oney Walter.Programming the icrosoft windows driver model[M].Redmond,Wash.:Microsoft Press,2003.
  • 9Mark E Russinovich,David A Solomon.Microsoft windows internals fourth edition[M].Redmond Wash:Microsoft Press,2005.
  • 10Lipmaa H,Rogaway P,Wagner D.Comments NIST concerning AES modes of operations:CTR-mode encryption[C].Symmetric Key Block Cipher Modes of Operation Workshop Baltimore Maryland US,20 October 2000.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部