期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Android系统应用程序组件安全性分析 被引量:9
1
作者 曾立鹍 唐泉彬 牛斗 《软件》 2014年第3期147-151,共5页
针对当前Android系统第三方应用程序组件中普遍存在的各种安全问题,分析了引起这种问题的原因。提出了一种基于静态分析Android应用程序中四种组件的属性信息和Java系统服务中的敏感API(Application Programming Interface)调用信息,通... 针对当前Android系统第三方应用程序组件中普遍存在的各种安全问题,分析了引起这种问题的原因。提出了一种基于静态分析Android应用程序中四种组件的属性信息和Java系统服务中的敏感API(Application Programming Interface)调用信息,通过构建Android应用程序的函数调用关系图,检测组件入口函数和和敏感API之间可能存在的不安全的静态可执行路径。该方案主要利用反编译、XML(extensible markup language)文件解析和正则表达式匹配技术以获取应用程序的组件和敏感API的调用信息。实验结果表明了该方案的可行性和有效性。 展开更多
关键词 组件安全性 静态检测 函数调用关系图 静态可执行路径
下载PDF
具有安全属性图编程组件的设计研究
2
作者 李强 张建丰 《微型机与应用》 2017年第3期75-78,81,共5页
研究和实现了具有安全属性的可编程逻辑控制器(Programmable Logic Controller,PLC)编程组件。组件采用IEC61131-3标准功能块模型,既满足了IEC61131-3标准编程语言规范,也实现了组件在标准PLC编程软件的复用。组件在PLC编程中可按需求... 研究和实现了具有安全属性的可编程逻辑控制器(Programmable Logic Controller,PLC)编程组件。组件采用IEC61131-3标准功能块模型,既满足了IEC61131-3标准编程语言规范,也实现了组件在标准PLC编程软件的复用。组件在PLC编程中可按需求改变接口,其封装接口满足TC6 XML schema属性定义,增加的安全属性实现了组件的安全复用。最后,在Microsoft Visual Studio(VS)2012中运用.NET组件技术和C#编程语言实现了组件,并对组件进行了相关验证。 展开更多
关键词 IEC61131-3 TC6 XML SCHEMA 组件安全性
下载PDF
Software Composition of Different Security Level Components 被引量:1
3
作者 Frank Tsui Edward Jung Sheryl Duggins 《Computer Technology and Application》 2011年第11期835-842,共8页
In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associat... In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive. 展开更多
关键词 Software composition SECURITY component-design.
下载PDF
Safety Requirements And Inspections Methods For Insulating Components Used In Electrical Accessories
4
作者 Chen Weidong Guo Chunyu 《International Journal of Technology Management》 2014年第8期43-45,共3页
This paper covers the safely requirements and inspection methods for insulating components used in electrical accessories by an analyzing the properties of the insulating components used in electrical accessories base... This paper covers the safely requirements and inspection methods for insulating components used in electrical accessories by an analyzing the properties of the insulating components used in electrical accessories based on the standard of IEC 60884. 展开更多
关键词 Electrical accessories Insulating components Safety requirements Inspection methods
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部