期刊文献+

移动智能终端操作系统安全评估方法 被引量:3

Operating System Security Assessment Method for the Mobile Intelligent Terminal
下载PDF
导出
摘要 随着移动互联网的发展,移动智能终端成为了访问互联网的主要方式之一。由于移动智能终端的自身能力受限,传统的基本安全防护方法难以直接应用于移动智能终端。文中针对移动智能终端面临的安全问题,结合移动智能终端的自身特性,提出了移动智能终端安全操作系统的评估体系和方法,给出了移动智能终端安全功能的测试过程和方法。此方法具有开销小,安全性高的特点,能够从源头上保证移动互联网的安全。 With the development of the mobile Internet,the mobile intelligent terminal has become one of the main ways to access the Internet.As the mobile terminal's capacity is limited,the available basic security methods cannot be applied directly to the mobile intelligent terminal.To solve the security issues of the mobile intelligent terminal,this paper proposes an operating system security assessment method for the mobile intelligent terminal with the characteristics of the mobile intelligent terminal considered.The process and method of testing the security function for the mobile intelligent terminal are presented.The proposed method has the advantages of low overhead and high security level,and can ensure the security of the mobile internet from the source.
作者 沈雷
出处 《电子科技》 2012年第3期38-41,共4页 Electronic Science and Technology
关键词 移动互联网 移动智能终端 操作系统 安全评估 mobile internet mobile intelligent terminal operating system security assessment
  • 相关文献

参考文献7

  • 1Cnnic.第26次中国互联网络发展状况统计报告[R].北京:中国互联网络信息中心.2010.
  • 2CNCERT/CC.中国互联网网络安全报告[R].北京:中国互联网应急技术处理协调中心,2010.
  • 3PATRICIA M M,DONNA H.Business risks and security as-sessment for mobile devices[J].Information Systems ControlJournal,2008(1):1-6.
  • 4安鑫.基于移动网络的手机缴纳电费系统的设计与研究[J].电子科技,2010,23(3):104-106. 被引量:5
  • 5车一,龙华,蒋华龙.下一代移动通信业务的自相似研究和实现[J].电子科技,2008,21(2):55-57. 被引量:3
  • 6JI S J,JUNG S Y,LEE J H.Opportunities and threats ofsmart-phone[C].Seoul,Korea:Internet&Security Issues,Korea Information Security Agency,2010.
  • 7JANG S K.Security threats in smart-phone environment[J].Korea Information Processing Society Review,2010(17):64-69.

二级参考文献12

  • 1赵小燕,殷群.打造移动数据产业链运营商是主角[J].通信企业管理,2005(7):29-31. 被引量:2
  • 2甲乙科技工作室.局域网组建管理与维护[M].北京:清华大学出版社,2008.
  • 3Song Shibin,Joseph Kee -Yin Ng,Tang Bihai.Some Results on the Self - Similarity Property in Communication Networks[].IEEE Transactions on Communications.2004
  • 4Mischa Schwartz.Broadband Integrated Networks[]..2001
  • 5Roberts J,Mocci U,Virtamo J.Broadband Network Teletrafic[].Final Report of Action COST.1996
  • 6Abbas Jamalipour.The Wireless Mobile Internet Architectures, Protocols and services[]..2002
  • 7Pruthi P,Erramilli A.Heavy - tailed on/off source behavior and self - similar traffic[].Proc ICC.1995
  • 8Ryu B,Lowen S.Fractural Traffic Models for Internet Simulation[].IEEE Int‘l Symposium on Computer Communications.2000
  • 9Hua Long.OPNET Modeler and Computer Network Simulation[]..2006
  • 10Addie R G,Zukerman M,Neame T D.Fractal Traffic: Measurements, Modelling and Performance Evaluation[].Proceedings of Infocom‘.1995

共引文献12

同被引文献10

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部