Research and implementation key technology of security mobile office

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To address the information leakage problems existed in the smartphone mobility office of enterprises and institutions, we propose security mobile office architecture and design application security authentication mechanism, software and hardware resource control mechanism, security storage isolation mechanism, which provide safe protection for sensitive data. To evaluate the propose schemes, we implement them in the android system and cloud service platform. The evaluation results verify the feasibility and effectiveness of the security mobile office technology.

Cite

CITATION STYLE

APA

Qiu, F., & Li, X. (2016). Research and implementation key technology of security mobile office. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10067 LNCS, pp. 105–114). Springer Verlag. https://doi.org/10.1007/978-3-319-49145-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free