首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
近年来,随着Android手机技术的日益进步,客户端上的应用程序可以通过相对应的开放式API访问手机卡片上的应用程序。结合Android核心技术与访问控制安全等方面因素,介绍了最新访问控制实现方式与规范,并提出一种手机卡片中访问控制规则的实现方案以及应用示例。  相似文献   

2.
设计并实现一种基于Android操作系统的手机文件备份系统。利用Android手机客户端应用程序将需备份的文件进行差异计算,根据差异计算的结果将差异文件发送到备份服务器,实现远程文件同步。测试结果表明,该系统能够实现Android手机文件备份到远程服务器,并对网络带宽的消耗较小。  相似文献   

3.
随着Android操作系统的广泛应用,基于Android平台的应用程序的数量日益增长。如何有效地识别恶意软件,对保护手机的安全性至关重要。提出了基于权限和API特征结合的Android恶意软件检测方法,该方法通过反编译apk文件来提取权限特征和API特征,并将两者相结合作为一个整体的特征集合。在此基础上,采用分类算法进行恶意软件的甄别。实验结果表明,该方法的判别准确率高于权限集合或API集合单独作为特征的判别方法,从而能更加有效地检测Android恶意应用程序。  相似文献   

4.
针对Android开源性带来的手机隐私信息泄露的问题,通过采用获取访问权限的方法,建立了基于Android安全机制的权限检测系统.该系统综合利用了特征选择算法、反编译及XML (extensible markup language)文件解析来获取权限信息.通过设定筛选机制来筛选出访问敏感权限的程序和APK (android package)文件.手机用户通过该系统不仅可以检测已安装软件,还可以检测未安装的APK文件,从而更全面的保证手机用户信息的安全.实验结果表明了该系统的可行性和有效性.  相似文献   

5.
Android安全加固技术   总被引:1,自引:0,他引:1  
为了保护Android智能手机安全,在深入分析Android系统安全机制的基础上,提出了一个基于强制访问控制的安全加固技术.该技术首先通过修改Android内核,添加一个平台无关的强制访问框架,其次为进程、文件等系统对象添加安全属性,最后通过制定一套细粒度的强制访问规则,对应用程序实施强制访问控制.通过在模拟环境中的测...  相似文献   

6.
目前,透明加密技术在Windows平台下已经得到了广泛的应用,但在移动平台下的应用还有待探索。针对目前日益突出的手机数据安全问题,在对比分析了钩子透明加密和驱动透明加密这两种主要透明加密技术的基础上,设计了一种基于Android平台的文件透明加密系统。为了与传统手机加密系统区别开来,系统的身份验证环节被转移到Android手机自带的屏幕解锁环节上,有效提高了加密效率和用户体验。文中描述了该系统的总体设计方案和各个模块的设计方法,并给出了内核模块所使用的一些关键技术和重要的实现方法。测试数据表明,该系统能有效对手机应用程序和文件进行透明加密,同时又有较好的加密效率和用户体验。  相似文献   

7.
基于Android平台,以Eclipse为开发工具,设计并实现了一个安卓手机APP小应用软件——"别动我"。该APP主要功能是保护安卓手机用户的隐私,软件运行后,随便移动手机,手机就会发出警报。该实例充分展示了基于Android平台的APP的开发过程和方法。  相似文献   

8.
《微型机与应用》2014,(13):77-80
提出一种基于Android平台的脑电无线采集与警觉度监测终端的设计。采用Wi-Fi作为无线通信方案,以Android手机作为上位机,在手机上设计应用程序,通过手机应用程序可以方便地实现对采集设备的参数设置、无线连接、数据接收、波形显示、数据分析和文件存储。Android手机端通过Wi-Fi与下位机建立通信,实时接收Wi-Fi模块发送的脑电数据,绘成脑电图,并能通过手机端向下位机发送控制命令,再将基于极限学习机的脑电信号分类算法通过Java编码移植到手机内部,分析脑电信号所携带的警觉度信息。立足便携式脑电信号无线采集系统,在系统中加入基于Android系统的传输控制方法,并植入训练速度快、分类效果好的算法程序,为便携式脑电信号采集提供了一个新方案。  相似文献   

9.
《信息与电脑》2010,(1):38-38
City Search12月21日宣布推出用于Google Android手机平台的应用程序Mobileby Citysearch。该软件使Android手机用户能通过GPS寻找最近的餐厅、咖啡馆、银行、商场、电影院以及其它各种在住宅附近的服务设施,通过Google地图指示所在位置。移动用户可通过电子邮件、短信或Twitter及时与朋友联络,分享信息。  相似文献   

10.
随着移动通信技术的发展和应用的推广,手机犯罪成为新的犯罪趋势,手机取证是打击该类犯罪的一个有效手段。直接调用API方法不能恢复Android手机数据,现有方法存在无法恢复删除数据部分被覆盖的问题。为此,通过分析Android系统SQLite数据库的文件结构和数据记录的寻址方式,提出一种Android系统删除数据恢复方法,即探测估算预提取数据所在表的每个Type字段,提取恢复删除数据,结合尽最大努力恢复方法,针对删除数据部分被覆盖的情况,讨论其恢复的可能性并进行获取。在Android手机模拟器上进行验证,结果表明,该方法能成功恢复删除数据,与传统方法相比,在不影响信息提取精确度的前提下,提高了删除数据的恢复率。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

14.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

15.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

17.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

18.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

19.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号