Controlling mobile device access to secure data

作者: Nitin Desai , Zhongmin Lang , James Robert Walker , Gary Barton

DOI:

关键词:

摘要: Various aspects of the disclosure relate to providing secure containers or data vaults for one more managed applications. In some embodiments, each application may be assigned its own private vault and/or a shared that is accessible at least other application. As executes, calls access intercepted and redirected containers. Data stored in container encrypted according policy. Other deleting from container, such as via selective wipe associated with Further configuring creating containers, retrieving key information required encrypt/decrypt publishing applications, policy download mobile device.

参考文章(551)
Kenneth Seier, Coleen Crawford, Flexible multi-media data management ,(2006)
Paul Krzyzanowski, Daniel Gittleman, Communication devices, networks, services and accompanying methods ,(2011)
Vishwanath Venkataramappa, Single sign on for kerberos authentication ,(2002)
Abolfazl Sirjani, Michael Burr, Min-Chih Earl, Anatoliy Panasyuk, System and method for managing virtual ip addresses ,(2004)
Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang, Plagiarizing smartphone applications: attack strategies and defense techniques international conference on engineering secure software and systems. pp. 106- 120 ,(2012) , 10.1007/978-3-642-28166-2_11