期刊文献+

一种新型过程神经元网络安全模型

A novel process neural networks security model
在线阅读 下载PDF
导出
摘要 提出一种基于反馈过程神经元网络的安全模型PNNSM,对移动终端在复杂移动环境下的行为实施安全控制。该模型通过策略函数化实现策略和决策的简化,通过反馈过程神经元网络和孤立点策略库实施系统行为的过程控制,以较小的开销为代价实现对移动终端的细粒度的安全保护。安全性分析表明PNNSM比其他安全模型更安全、更高效。 This paper proposes a novel process neural networks security model (PNNSM) which is able to control the actions of the mobile termination in a complex environment. The policy functionalization method is adopted by the PNNSM to simplify the policy and the decision, and the process neural networks and the policy library of isolated points control actions of the mobile ter- mination. Hence, the overhead is very small. Security analysis shows that PNNSM is more secure than other security models.
出处 《中国科技论文》 CAS 北大核心 2013年第4期321-326,共6页 China Sciencepaper
基金 国家高技术研究发展计划(863计划)资助项目(2011AA01A203) 国家自然科学基金资助项目(61103020)
关键词 安全模型 移动终端 过程神经元网络 策略函数化 security model mobile termination process neural networks policy {unctionalization
  • 相关文献

参考文献20

  • 1腾讯移动安全实验室.2012年第三季度手机安全报告ER/OL].[2012-12-15].http://msm.qq.com/scan/news/secure_news_detail.jsp?id=121&from=index.
  • 2McAfee. McAfee partners with SFR security mobile to safeguard personal data for android, blackberry and symbian OS users [A/OL]. [2011-12-18]. http:// www. mcafee, com/us/about/news/2011/q1/20110216- 03. aspx.
  • 3Dietz M, Shekhar S, Pisetsky Y, et al. Quire: light- weight provenance for smart phone operating systems [C]//Proceedings of the 20th USENIX Security Sym-posium. USA: USENIX, 2011:23-33.
  • 4Enck W, Gilbert P, Chun B, et al. TaintDroid.. an in- formation-flow tracking system for realtime privacy mo- nitoring on smartphones [C]//USENIX Symposium on Operating Systems Design and Implementation(OSDI). USA.- USENIX, 2010:1-6.
  • 5Vasudevan A, Owusu E, Zhou Zongwei, et al. Trust- worthy execution on mobile devices: what security properties can my mobile platform give me?[R]. Cy- Lab: Carnegie Mellon CyLab, Technical Report CMU CyLab-ll-023, 2011.
  • 6Winter J. Trusted computing building blocks for em- bedded linux-based arm trustzone platforms [C]//STC 2008: Proceedings of the 3rd ACM workshop on Scala- ble trusted computing. New York, USA: ACM, 2008: 21- 30.
  • 7ARM Corporation. ARM security technology-building a secure system using TrustZone technology [R]. ARM Teehnical White Paper, Publication number: PRD29- GENC-009492C, 2009.
  • 8Conti M, Nguyen V, Crispo B. Crepe.. context-related policy enforcement for android [C]//Proceeding ISG' 10 Proceedings of the 13th International Conference on In- formation Security. USA: ACM, 2011: 331-345.
  • 9Ongtang M, McLaughlin S, Enck W, et al. Semanti- cally rich application-centrie security in android[J]. J Scour Commun Network, 2011, 5(6): 658-673.
  • 10Bugiel S, Davi L, Dmitrienko A, et al. Practical and lightweight domain isolation on android [C]//Proceed- ings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. USA: ACM, 2011:51-62.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部