Study on the Key Technologies of Smartphone Application Security
Mobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox ar...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529259924914176 |
---|---|
author | Xuan Luo Baiqing Liang Junbiao Pan Yue Huang |
author_facet | Xuan Luo Baiqing Liang Junbiao Pan Yue Huang |
author_sort | Xuan Luo |
collection | DOAJ |
description | Mobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox architecture of the mobile OS,the permission revocation on runtime,the inter-communication between mobile applications and components,and the information-flow tracking. It was aimed to explore and analyze the security key technologies,and showed the future trends of mobile phone security. |
format | Article |
id | doaj-art-5d7cde0909834a809848f0fde0fd6d8f |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2013-05-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-5d7cde0909834a809848f0fde0fd6d8f2025-01-15T03:22:33ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-05-0129192759628561Study on the Key Technologies of Smartphone Application SecurityXuan LuoBaiqing LiangJunbiao PanYue HuangMobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox architecture of the mobile OS,the permission revocation on runtime,the inter-communication between mobile applications and components,and the information-flow tracking. It was aimed to explore and analyze the security key technologies,and showed the future trends of mobile phone security.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/mobile phone securitysandboxdiscretionary access contro1mandatory access contro1AndroidiOS |
spellingShingle | Xuan Luo Baiqing Liang Junbiao Pan Yue Huang Study on the Key Technologies of Smartphone Application Security Dianxin kexue mobile phone security sandbox discretionary access contro1 mandatory access contro1 Android iOS |
title | Study on the Key Technologies of Smartphone Application Security |
title_full | Study on the Key Technologies of Smartphone Application Security |
title_fullStr | Study on the Key Technologies of Smartphone Application Security |
title_full_unstemmed | Study on the Key Technologies of Smartphone Application Security |
title_short | Study on the Key Technologies of Smartphone Application Security |
title_sort | study on the key technologies of smartphone application security |
topic | mobile phone security sandbox discretionary access contro1 mandatory access contro1 Android iOS |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/ |
work_keys_str_mv | AT xuanluo studyonthekeytechnologiesofsmartphoneapplicationsecurity AT baiqingliang studyonthekeytechnologiesofsmartphoneapplicationsecurity AT junbiaopan studyonthekeytechnologiesofsmartphoneapplicationsecurity AT yuehuang studyonthekeytechnologiesofsmartphoneapplicationsecurity |