期刊文献+

面向Android隐私保护机制的多域隔离模型设计 被引量:1

Design of Multi-domain Isolation Model for Android Privacy Protection Mechanism
下载PDF
导出
摘要 针对Android系统粗粒度的权限机制及隐私保护机制安全性较低的问题,提出粒度可控的多域隔离隐私保护模型MDSDroid,并在Android系统上设计模型实现框架。通过定义模型变量以及访问控制策略,实现应用程序及其数据间的隔离和强安全访问控制机制。采用Z语言对模型进行形式定义,并运用形式验证工具Z/EVES进行形式分析,保证模型策略的正确执行,在增强系统安全的同时保护隐私数据的安全性。实验结果表明,该模型系统与Android原生系统相比具有较低的性能损耗。 Aiming at the problem of coarse granularity access mechanism and weak privacy protection mechanism in Android system. Multi-domain isolation privacy protection model (MDSDroid) with adjustable granularity is proposed and the model implementation framework is designed in the Android system. Through defining the model variables and access control policy, the framework can effectively isolate the applications and application data, and realize strong security access control mechanism. Z language is used to define the model which is then verified with the help of Z/EVES tool to ensure the correct performance of the model policy. The system security is enhanced and the security of privacy data is protected. Experimental results show that the model system is less than Android primary system performance.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第10期134-140,共7页 Computer Engineering
基金 国家重点研发计划项目"协同精密定位技术"(2016YFB0501900) 国家部委基金
关键词 安卓系统 隐私数据 域隔离 安全策略 形式化 Android system privacy data domain isolation security policy formalization
  • 相关文献

参考文献7

二级参考文献273

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2R O' Brien,C Rogers.Developing applications on lock[C].The National Computer Security Conf,Washington,1991
  • 3W E Boebert,R Y Kain.A practical alternative to hierarchical integrity policies[C].The National Computer Security Conf,Gaithersburg,Maryland,1985
  • 4Lee Badger,Daniel F Sterne,David L Sherman,et al.A domain and type enforcement Unix prototype[C].The 5th USENIX UNIX Security Symposium,Salt Lake City,1995
  • 5National Security Agency.Security-Enhanced Linux[OL].http://www.nsa.gov/selinux,2007
  • 6Serge E Hallyn,Phil Kearns.Tools to administer domain and type enforcement[C].The 15th Conf on Systems Administration (LISA 2001),San Diego,California,2001
  • 7KM Walker,DF Sterne,LM Badger,et al.Confining root programs with domain and type enforcement (DTE)[C].The 6th USENIX Security Symp,San Jose,1996
  • 8Tresys Technology[OL].http://www.tresys.com/selinux/index.html,2007
  • 9Marshall D Abrams,Michael V Joyce.Trusted system concepts[J].Computers and Security,1995,14(1):45-56
  • 10Paul A Karger,Mary Ellen Zurko,Douglas W Bonin,et al.A retrospective on the VAX VMM security kernel[J].IEEE Trans on Software Engineering,1991,17(11):1147-1165

共引文献282

同被引文献12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部