Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 353-356.doi: 10.11896/j.issn.1002-137X.2017.11A.074
Previous Articles Next Articles
LI Ni-ge, MA Yuan-yuan, CHEN Mu, CHEN Lu and XU Min
[1] PIRRETTI M,TRAYNOR P,MCDANIEL P,et al.Secure Atrribute-Based Systems[J].Journal of Computer Security,2010,8(5):799-837. [2] ION I,DRAGOVIC B,CRISPO B.Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices[C]∥Proc.of the Annual Computer Security Applications Conference.2007:233-242. [3] ZHANG X W,ACIIMEZ O,SEIFER J.A Trusted MobilePhone Reference Architecture via Secure Kernel[C]∥Proc.of the ACM workshop on Scalable Trusted Computing.2007:7-14. [4] ENCK,WILLIAM ONGTANG,et al.On Lightweight Phone Ap-plication Certification[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.2009:235-245. [5] KIRKPATRICK M S,BERTINO E.Enforcing Spatial Constr-aints for Mobile RBAC Systems[C]∥Proc.of the 15th ACM Symposium on Access Control Models and Technologies.2010:99-108. [6] NAUMAN M,KHAN S,ZHANG X W,et al.Beyond Kernel-Level Integrity Measurement Enabling Remote Attestation for the Android Platform[C]∥International Conference on Trust and Trustworthy Computing.2010:1-15. [7] NSA.http://selinuxproject.org/page/SEAndroid. [8] 黄琳雅.基于内核的Android文件访问控制研究[D].北京:北京邮电大学,2012. [9] 易筱茂.面向Android操作系统的强制访问控制研究[D].北京:中国科学院大学,2015. [10] 卿斯汉.Android 安全的研究现状与展望[J].电信科学,2016(10):1-8. |
No related articles found! |
|