您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 经营企划 > 面向移动互联网终端的安全态势感知研究
261211141007328621124000UML013GGPRSInternetWi-FiInternet(1)3GCDMAWi-Fi(2)InternetIP(3)2(1)(DecInfo)(TelNum)CPU(CPUInfo)(MemInfo)(DiscInfo)(PlaceInfo)(2)(SysInfo)IP(IPAddress)(ProInfo)(PortInfo)(NetInfo)(3)(AppInfo)(SerInfo)(ResInfo)(No.IRT1012)(11JJ7003)(1982-)(1969-)(1982-)27UMLMO_FoundationMO_ThreatenMO_VulnerabilityMO_LeakMO_KillVirusMO_DeciveMO_DataMO_ServerMO_App3(1)1AndroidGoogle2007AndroidAndroid2012GoogleAndyRubinAndroid2011250%85M/S(Mobile/Server)MobileServerServerClient(2)MobileSMSAndroid/AndroidabortBroadcast()2API(1)11/system/bin/cat/proc/version2APISystem.getProperty3APIGetSystemService.getDeviceId()4CPU/system/bin/cat/proc/cpuinfo5/system/bin/cat/proc/meminfo6“system/bin/df7/system/bin/netcfg8APIgetPackageManager().getInstalledApplications(0)9ServiceAPIgetRunningServices.(RunningServiceInfo)10IPAPIgetSystemService(WIFI_SERVICE).getIpAddress()11APILocaionManager.getLatitude()LocaionManager.getLongitude()28(1)IPGIS(2)CPUDDoS(3)CPU4[1].[M].:.2010.[2].[D].:.2009.[3]..[J]..2009.[4]BreakerJacquieBeginningJavaObjects[M].WroxPress.2002.[5]Android.[EB/OL][6],.Android[M]:.2011.[7]PaulPOCATILU.AndroidApplicationSecurity[D].InformaticaEconomica.vol.15.no.3/2011.ResearchofSecuritySituationAwarenessbasedonMobileNetworkTerminalZhangQi1,2,ZhongQiuxi1,GongJianwei11CollegeofComputer,NationalUniversityofDefenseTechnology,Hunan,410073,China2ArmedPolice8620Force.Liaoning,124000,ChinaAbstract:ThemobileInternetisamobilecommunicationnetworkandInternetintegrationproduct.Itscompositionisflexible,thefunctionaldifferences.Firstthepaperanalysisofthemobileterminalsecurity,thendesignamobileterminalsecuritysituationalawarenessmodelbasedonobject-oriented.ThemodelusingUMLclassdiagramsdescribetheawarenessindexofterminalsecurity.Finallydesignasituationdataperceptiveframework,achievethemobileterminalremoteaccesstothesecuritysituationinthedata.Keywords:Mobilenetwork;Mobileterminal;Situationawareness;Awarenessindex[59]TheModelofExtendedVisualEryptographyEchemesThatUseOnlyapairofBasicMatrixesWuLi1,WuWenbin21ComputerTeachingandResearchSectionofBenxiHealthSchool,Liaoning,117022,China2ComputerTeachingandResearchSectionofBenxiTrafficSchool,Liaoning,117016,ChinaAbstract:ItsummarizedAtenies-Blundo-Santis-Stinsoncontinuationtypevisualcryptographymodel,discussedthethresholdmodelbasicmatrixandthegeneralvisitstructuremodel,themodelofextendedvisualcryptographyschemesthatuseonlyapairofbasicmatrixesisresearchedandtheconstructingmethodispresented.putforwardbasingonthematrixandbuythecontinuationofthresholdandgeneralvisitstructuretheconstructivemethodofvisualcryptography.Keywords:VisualCryptography;ConstructingModel;BasicMatrix;AccessStructure
本文标题:面向移动互联网终端的安全态势感知研究
链接地址:https://www.777doc.com/doc-2646309 .html