首页 | 本学科首页   官方微博 | 高级检索  
     

3G系统的安全策略分析
引用本文:马浩歌,吴勇.3G系统的安全策略分析[J].郑州轻工业学院学报(自然科学版),2006,21(1):68-70.
作者姓名:马浩歌  吴勇
作者单位:河南工业大学,信息科学与工程学院,河南,郑州,450052
摘    要:介绍了当前3G系统面临的各种威胁和针对3G的攻击方法,如对非授权数据的非法获取、对数据完整性的攻击和对业务的非法访问攻击等.分析了3G系统的安全体系结构和安全特性的优缺点.

关 键 词:3G  安全威胁  攻击方法  体系结构
文章编号:1004-1478(2006)01-0068-03
收稿时间:2005-10-17
修稿时间:2005年10月17

3G system security policy analysis
MA Hao-ge,WU Yong.3G system security policy analysis[J].Journal of Zhengzhou Institute of Light Industry(Natural Science),2006,21(1):68-70.
Authors:MA Hao-ge  WU Yong
Affiliation:College of Infor. Sci. and Eng. , Henan Univ. of Tech. , Zhengzhou 450052, China
Abstract:Under the present situation,the 3G system faced with many threats,mainly displaying themselves in view of the 3G method of attack in following several aspects:to the non-authorized data illegal gain,the logarithm according to the complete attack and illegal visit attack to the service and so on.Analysizes 3G system security system structure and the advantages and disadvantages of the security specific property were analysized.
Keywords:The third generation  security theratens  attack method  system structure
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号