To address the information leakage problems existed in the smartphone mobility office of enterprises and institutions, we propose security mobile office architecture and design application security authentication mechanism, software and hardware resource control mechanism, security storage isolation mechanism, which provide safe protection for sensitive data. To evaluate the propose schemes, we implement them in the android system and cloud service platform. The evaluation results verify the feasibility and effectiveness of the security mobile office technology.
CITATION STYLE
Qiu, F., & Li, X. (2016). Research and implementation key technology of security mobile office. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10067 LNCS, pp. 105–114). Springer Verlag. https://doi.org/10.1007/978-3-319-49145-5_11
Mendeley helps you to discover research relevant for your work.