{"title":"用于保护移动设备上的敏感和机密数据的安全模型","authors":"M.T. Asghar, M. Riaz, J. Ahmad, S. Safdar","doi":"10.1109/ISBAST.2008.4547665","DOIUrl":null,"url":null,"abstract":"The main objective of this research is to provide security to confidential information contained in mobile devices like PDA's and laptops. Hence the model is proposed to ensure the secure authentication as well as secure access to the required information. The secure authentication is ensured by combining two previously used authentication modes in the devices, that is: password-based and biometric authentication. Furthermore, the authentication information are not stored at a single point hence provides higher security and less risk. All the authentication information is distributed over local and remote (server) nodes. Decrypting only the required files leaving the rest of files encrypted can ensure the secure access to the information using session and file management proposed in this model. The proposed model of combining both mechanisms provides better security and reliability as compared to previous systems.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security model for the protection of sensitive and confidential data on mobile devices\",\"authors\":\"M.T. Asghar, M. Riaz, J. Ahmad, S. Safdar\",\"doi\":\"10.1109/ISBAST.2008.4547665\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main objective of this research is to provide security to confidential information contained in mobile devices like PDA's and laptops. Hence the model is proposed to ensure the secure authentication as well as secure access to the required information. The secure authentication is ensured by combining two previously used authentication modes in the devices, that is: password-based and biometric authentication. Furthermore, the authentication information are not stored at a single point hence provides higher security and less risk. All the authentication information is distributed over local and remote (server) nodes. Decrypting only the required files leaving the rest of files encrypted can ensure the secure access to the information using session and file management proposed in this model. The proposed model of combining both mechanisms provides better security and reliability as compared to previous systems.\",\"PeriodicalId\":443027,\"journal\":{\"name\":\"2008 International Symposium on Biometrics and Security Technologies\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Biometrics and Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISBAST.2008.4547665\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Biometrics and Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2008.4547665","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security model for the protection of sensitive and confidential data on mobile devices
The main objective of this research is to provide security to confidential information contained in mobile devices like PDA's and laptops. Hence the model is proposed to ensure the secure authentication as well as secure access to the required information. The secure authentication is ensured by combining two previously used authentication modes in the devices, that is: password-based and biometric authentication. Furthermore, the authentication information are not stored at a single point hence provides higher security and less risk. All the authentication information is distributed over local and remote (server) nodes. Decrypting only the required files leaving the rest of files encrypted can ensure the secure access to the information using session and file management proposed in this model. The proposed model of combining both mechanisms provides better security and reliability as compared to previous systems.