Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
The mobile internet architecture and its security risks were introduced.Then the index system of evaluation was discussed,which mainly included confidentiality,integrity,availability,reliability,safety and performability.In the end,a method was proposed for evaluating end-to-end service security.
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-08-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.08.012/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529254518456320 |
---|---|
author | Rong Yue Hong Li |
author_facet | Rong Yue Hong Li |
author_sort | Rong Yue |
collection | DOAJ |
description | The mobile internet architecture and its security risks were introduced.Then the index system of evaluation was discussed,which mainly included confidentiality,integrity,availability,reliability,safety and performability.In the end,a method was proposed for evaluating end-to-end service security. |
format | Article |
id | doaj-art-4eca659eca154b77b3743666977403cb |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2013-08-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-4eca659eca154b77b3743666977403cb2025-01-15T03:22:08ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-08-0129747959627516Study of Mobile Internet Security Risk and End-to-End Service Security EvaluationRong YueHong LiThe mobile internet architecture and its security risks were introduced.Then the index system of evaluation was discussed,which mainly included confidentiality,integrity,availability,reliability,safety and performability.In the end,a method was proposed for evaluating end-to-end service security.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.08.012/mobile internetsecurity riskend-to-endconfidentialityintegralityavailability |
spellingShingle | Rong Yue Hong Li Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation Dianxin kexue mobile internet security risk end-to-end confidentiality integrality availability |
title | Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation |
title_full | Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation |
title_fullStr | Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation |
title_full_unstemmed | Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation |
title_short | Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation |
title_sort | study of mobile internet security risk and end to end service security evaluation |
topic | mobile internet security risk end-to-end confidentiality integrality availability |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.08.012/ |
work_keys_str_mv | AT rongyue studyofmobileinternetsecurityriskandendtoendservicesecurityevaluation AT hongli studyofmobileinternetsecurityriskandendtoendservicesecurityevaluation |