期刊文献+

基于透明加密的移动终端数据防泄露系统 被引量:3

Data leakage prevention system based on transparent encryption for mobile terminal equipment
下载PDF
导出
摘要 企业关键数据向移动终端设备延伸,使移动终端数据泄露成为企业面临的一个新的问题。针对移动终端数据泄露问题,提出了基于预解密的透明加密技术,有效解决移动终端传统透明加密技术只能保证应用层安全的缺陷,并提升了透明加密性能。同时,利用瘦客户端与移动终端数据防泄露相融合的思想,进一步设计面向移动终端的虚拟远程桌面技术,彻底屏蔽数据流传输的弊端,保证了移动终端数据的安全传输。在此基础上,设计与实现了一套面向移动智能终端的数据防泄露系统。 With the trend that enterprise key data moves to mobile terminal, data leakage prevention has become an important issue on mobile terminal. To solve the problem, a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security, in addition, performance on mobile was improved. At the same time, taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data, a virtual remote desktop technology on mobile was proposed, which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data. Finally, a data leakage prevention system for mobile terminal was set up, which makes the mobile terminal fully and effectively protected.
出处 《通信学报》 EI CSCD 北大核心 2016年第S1期189-196,共8页 Journal on Communications
基金 国家自然科学基金资助项目(No.61572255) 江苏省"六大人才高峰"高层次人才基金资助项目(No.XYDXXJS-032) 中国博士后科学基金资助项目(No.2015M582622) 物联网信息安全技术北京市重点实验室开放课题基金资助项目(No.J6V0011104)~~
关键词 数据防泄露 透明加密 虚拟远程桌面 data leakage prevention transparent encryption virtual remote desktop
  • 相关文献

参考文献4

二级参考文献98

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Llamas R, Restivo K, Shirer M. Android Marks Fourth Anniver- sary Since Launch with 75. 0% Market Share in Third Quarter[EB/OL]. https..//www, idc. com/getdoc, jsp? eontainerId = prUS23771812, IDC, 2012. 被引量:1
  • 3Kleidermacher D, Kleidermacher M. Embedded System Security Practical Methods for Safe And Secure Software and Systems Development [M]. Waltham, MA, USA: Elsevier Inc, 2012 4-24. 被引量:1
  • 4Armando A, Merlo A, Verderame L, et al. An Empirical Evalua- tion of the Android Security Framework[C] // Proceedings of the 28th IFIP TC-11 International Information Security and Pri- vacy Conference (SEC 2013). Auckland: Springer, 2013 176 189. 被引量:1
  • 5Smalley S, Craig R. Security Enhanced (SE) Android: Bringing Flexible MAC to Android [C/OL]. http://selinuxproject. Org/ se-android/papers/NDSS2013-SEAndroid-Paper, pdf, NI)SS, 2013. 被引量:1
  • 6Jhswx84. SELinux i f [ M/OL]. http://wenku, baidu, com/ view/4d26594fc850ad02deS04189, html, Baidu, 2012. 被引量:1
  • 7Enck W,Ongtang M,McDaniel P. Understanding Android secu- rity [J]. IEEE Security and Privacy Magazine, 2009 7 (1):50-57. 被引量:1
  • 8Sally.SEI.inux学习笔记[M/OL].http://wenku.itl68.com/d-001220063.shtml.ITl68,2013. 被引量:1
  • 9Spencer R, Smalley S, Loscocco P, et al. The Flask security ar- chitecture=System support for diverse security policies[C]// Proceedings of The Eighth USENIX Security Symposium. Washington: USENIX, 1999 : 123-139. 被引量:1
  • 10Carter J. Using gconf as an example of how to create an use- rspace object manager [C/OL]. http://www, nsa. gov/re search/ files/selinux/papers/gconf07-paper, shtml, NSA, 2009. 被引量:1

共引文献132

同被引文献27

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部