期刊文献+

基于访问控制列表机制的Android权限管控方案 被引量:8

Android permission management and control scheme based on access control list mechanism
下载PDF
导出
摘要 Android采用基于权限的访问控制方式对系统资源进行保护,其权限管控存在管控力度过粗的问题。同时,部分恶意程序会在用户不知情的情况下,在隐私场景下偷偷地对资源进行访问,给用户隐私和系统资源带来一定的威胁。在原有权限管控的基础上引入了访问控制列表(ACL)机制,设计并实现了一个基于ACL机制的Android细粒度权限管控系统。所提系统能根据用户的策略动态地设置应用程序的访问权限,避免恶意代码的访问,保护系统资源。对该系统的兼容性、有效性的测试结果表明,该系统能够为应用程序提供稳定的环境。 Android uses the permission-based access control method to protect the system resources,which has the problem of rough management.At the same time,some malicious applications can secretly access resources in a privacy scenario without the user s permission,bringing certain threats to user privacy and system resources.Based on the original permission management and control and with the introduction of Access Control List(ACL)mechanism,an Android fine-grained permission management and control system based on ACL mechanism was designed and implemented.The proposed system can dynamically set the access rights of the applications according to the user s policy,avoiding the access of malicious codes to protect system resources.Tests of compatibility and effectiveness show that the system provides a stable environment for applications.
作者 曹震寰 蔡小孩 顾梦鹤 顾小卓* 李晓伟 CAO Zhenhuan;CAI Xiaohai;GU Menghe;GU Xiaozhuo;LI Xiaowei(Gansu Information Center,Lanzhou Gansu 730030,China;Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;Northwest Institute of Eco-Environment and Resources,Chinese Academy of Sciences,Lanzhou Gansu 730030,China;Information Center of Gansu Association for Science and Technology,Lanzhou Gansu 730030,China)
出处 《计算机应用》 CSCD 北大核心 2019年第11期3316-3322,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61602475) 国家密码发展基金资助项目(MMJJ20170212) 甘肃省科技支撑计划项目(1504FKCA096)~~
关键词 ANDROID 数据安全 细粒度权限管控 访问控制列表机制 系统资源 Android information security fine-grained permission control Access Control List(ACL)mechanism system resource
  • 相关文献

参考文献3

二级参考文献7

  • 1[1]PSSG Draft 17 JTCI 22.42-1997,Draft standard for information technology-portable operating system interface(POSIX)part 1..system application program interface(API)-amendment #:protection,audit and control interfaces [C language][S]. 被引量:1
  • 2[2]PSSG Draft 17 JTCI 22.43-1997,Draft standard for information technology -portable operating system interface(POSIX)Part 2..shell and utilities-amendment # :protection,audit and control interfaces[S]. 被引量:1
  • 3[3]IEEE Draft P1003. 1e/2c IEEE Standard Department,1997 被引量:1
  • 4[4]Grunbacher A. Posix Access Control Lists on Linux,SuSE Labs,linux AG 被引量:1
  • 5[6]Gildfind A. Access Control lists and Extended attributes on linux,SGI 被引量:1
  • 6[7]Final evaluation report. Trusted Xenix v3. 0, National Computer Security center 被引量:1
  • 7[8]Morris J,et al. Linux Security Modules: General Security Support for the Linux Kernel. http:∥www. intercode. com. au/jamesm/lsm-usenix-html/lsm-html. html, 2002 被引量:1

共引文献7

同被引文献59

引证文献8

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部