期刊文献+

开放融合环境下的移动数据管控

Research on Mobile Data Management in an Open and Integrated Environment
下载PDF
导出
摘要 首先介绍了开放融合环境下的"无边界非受控"的新特点,分析了其新增攻击面,并从安全性和易用性2方面提出了多个评估角度:边界的隔离强度、内部安全机制的有效性、管控粒度及易用性.之后将现有的移动端数据管控方案归纳为两大类场景:个人设备(bring your own device,BYOD)场景和专用终端(corporation owned private enabled,COPE)场景.其中,BYOD场景的方案按照虚拟化隔离技术分为4类:应用沙箱、多用户,容器,虚拟机,COPE场景的方案又分为通用操作系统和专业操作系统2类.最后对这6类移动端数据管控方案进行了横向对比.应用沙箱隔离强度最低、安全性最低,但最容易部署实现,专用操作系统专用终端研制部署成本最高,易用性略差,但安全性也最高. The paper first introduces the new features of mobile office environment: boundaryless and uncontrollable. Then,several perspectives are proposed to evaluate current mobile security solutions, which include insolation strength, effectiveness of internal security mechanism, control granularity and usability. Current mobile security solutions are classified to 2 categories: BYOD and COPE. In the BYOD scenario,there are 4 types of solutions according to the virtualization technology: application sandbox,multi-account,container,and virtual machine. In the COPE scenario,it is classified to 2 types by the operating system: general operating system and customized operating system. Finally,these 6 types of solutions are compared systematically.Among these solutions,application sandbox has the lowest isolation strength and the lowest security,but has the highest usability and could be deployed with low cost. COPEwith customized OS has the highest RD cost,sacrifices some usability, but has the highest security performance.
作者 邹仕洪 卜东超 孙国峰 赵春雷 Zou Shihong;Bu Dongchao;Sun Guofeng;and Zhao Chunlei(School Of CyberSpace Security,Beijng University of Posts & Telecommunications,Beijng 100876;Beijing Yuanxin Technology,Co.Ltd.,Beijng 100013)
出处 《信息安全研究》 2018年第8期704-710,共7页 Journal of Information Security Research
基金 2018网络空间安全重点专项(2018YFB0803600)
关键词 开放融合 移动安全 数据管控 虚拟化 操作系统 open fusion open and integrated mobile security data management virtualization operating system
  • 相关文献

参考文献5

二级参考文献16

  • 1曾晓洋,顾震宇,周晓方,章倩苓.可重构的椭圆曲线密码系统及其VLSI设计[J].小型微型计算机系统,2004,25(7):1280-1285. 被引量:5
  • 2陈超,曾晓洋,章倩苓.一种新型硬件可配置公钥制密码协处理器的VLSI实现[J].通信学报,2005,26(1):6-11. 被引量:9
  • 3辛茜,曾晓洋,张国权,郭亚炜.真随机数发生器的系统建模与仿真[J].系统仿真学报,2005,17(1):53-56. 被引量:10
  • 4杨涛.一个安全操作系统--SUNIX的研究与设计:博士论文[M].长沙:国防科技大学计算机系,1993..
  • 5CARL SHAPIRO和HAI VARIAN.信息规则-网络经济的策略指导.张帆译.北京:中国人民大学出版社,2000.
  • 6孙健.网络经济学导论.北京:电子工业出版社,2005.
  • 7理查德·诺曼,拉裴尔·拉米雷斯.从价值链到价值群:设计交互式战略.《哈佛商业评论》精粹译丛--价值链管理.北京:中国人民大学出版社,哈佛商学院出版社,2001.
  • 8Schmidt AD, Schmidt HG, Batyuk L, Clausen JH, Camtepe SA, Albayrak S, Yildizli C. Smartphone malware evolution revisited: Android next target? Proc. of the 4th IEEE International Conference on Malicious and Unwanted Software. 2009. 1-7.
  • 9Android Open Source. http://source.android.com.
  • 10Android Developers. http://androidappdocs.appspot.com/index.html.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部