期刊文献+

移动用户隐私安全风险分析研究 被引量:1

原文传递
导出
摘要 本文首先列出新时代环境背景下隐私的含义和大体分类,并简要说明各类隐私数据的特征;然后分类分析了用户隐私面临的四个方面的威胁;接着根据权威机构的调查报告对移动用户的移动生活行为方式和安全意识进行分析总结。
出处 《网络安全技术与应用》 2017年第12期92-93,共2页 Network Security Technology & Application
  • 相关文献

参考文献3

二级参考文献8

  • 1TCG mobile trusted module speeifieation: Version 1.0, Revision 7.02 [ S ]. Beaverton, OR, USA: Trusted Computing Group, 2010.
  • 2ALVES T, FELTON D. TrustZone.- integrated hardware and software security [J].Information Quarterly, 2004, 3 (4) : 18-24.
  • 3AZEMA J, FAYAD G. M-shield mobile security technology: making wireless secure [R]. Dallas, TX, USA: Texas Instrument, 2008.
  • 4DIETRICH K, WINTER J. Towards customizable, application specific mobile trusted modules[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 31-40.
  • 5DWIVEDI H, CLARK C, THIEL D. Mobile application security[M]. New York, NY, USA: McGraw Hill, 2010.
  • 6BUGIEI. S, EKBERG J E. Implementing an application-specific credential platform using late-launched mobile trusted module[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 21-30.
  • 7NAUMAN M, KHAN S, ZHANG X, et al. Beyond kernel- level integrity measurement: enabling remote attestation for the android platform [ C]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 17p.
  • 8SELLHORST M, STUBLE C, FELDMANN F, et al. Towards a trusted mobile desktop [ C ]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 7p.

共引文献43

同被引文献38

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部