Study on the Key Technologies of Smartphone Application Security

Mobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Xuan Luo, Baiqing Liang, Junbiao Pan, Yue Huang
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2013-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529259924914176
author Xuan Luo
Baiqing Liang
Junbiao Pan
Yue Huang
author_facet Xuan Luo
Baiqing Liang
Junbiao Pan
Yue Huang
author_sort Xuan Luo
collection DOAJ
description Mobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox architecture of the mobile OS,the permission revocation on runtime,the inter-communication between mobile applications and components,and the information-flow tracking. It was aimed to explore and analyze the security key technologies,and showed the future trends of mobile phone security.
format Article
id doaj-art-5d7cde0909834a809848f0fde0fd6d8f
institution Kabale University
issn 1000-0801
language zho
publishDate 2013-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-5d7cde0909834a809848f0fde0fd6d8f2025-01-15T03:22:33ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-05-0129192759628561Study on the Key Technologies of Smartphone Application SecurityXuan LuoBaiqing LiangJunbiao PanYue HuangMobile phone security has become increasingly important in mobile termina1. It is of particular concern as it relates to the security of personal information now stored on smartphones. Some key technologies will be greatly helpful to improve the security level of mobile device,such as the sandbox architecture of the mobile OS,the permission revocation on runtime,the inter-communication between mobile applications and components,and the information-flow tracking. It was aimed to explore and analyze the security key technologies,and showed the future trends of mobile phone security.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/mobile phone securitysandboxdiscretionary access contro1mandatory access contro1AndroidiOS
spellingShingle Xuan Luo
Baiqing Liang
Junbiao Pan
Yue Huang
Study on the Key Technologies of Smartphone Application Security
Dianxin kexue
mobile phone security
sandbox
discretionary access contro1
mandatory access contro1
Android
iOS
title Study on the Key Technologies of Smartphone Application Security
title_full Study on the Key Technologies of Smartphone Application Security
title_fullStr Study on the Key Technologies of Smartphone Application Security
title_full_unstemmed Study on the Key Technologies of Smartphone Application Security
title_short Study on the Key Technologies of Smartphone Application Security
title_sort study on the key technologies of smartphone application security
topic mobile phone security
sandbox
discretionary access contro1
mandatory access contro1
Android
iOS
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.05.004/
work_keys_str_mv AT xuanluo studyonthekeytechnologiesofsmartphoneapplicationsecurity
AT baiqingliang studyonthekeytechnologiesofsmartphoneapplicationsecurity
AT junbiaopan studyonthekeytechnologiesofsmartphoneapplicationsecurity
AT yuehuang studyonthekeytechnologiesofsmartphoneapplicationsecurity