[1] |
百度百科.移动办公[EB/OL]. , 2013-12-26.
|
[2] |
让办公移动起来畅谈思杰移动办公方式[EB/OL]. , 2012-11-08.
|
[3] |
Khan S, Nauman M, Othman A T, et al.How secure is your smartphone: An analysis of smartphone security mechanisms[C]//Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE, 2012: 76-81.
|
[4] |
蒋绍林, 王金双, 张涛, 等. Android 安全研究综述[J]. 计算机应用与软件, 2012, 29(10): 205-210.
|
[5] |
中国电子银行网.Android安全机制分析 [EB/OL]., 2013.08.23
|
[6] |
Apperian, Inc. Enterprise app store [EB/OL]. , 2014.
|
[7] |
Apperian, Inc. Creating a secure mobile application governance strategy [EB/OL]. , 2014.
|
[8] |
Apperian, Inc. Mobile app security [EB/OL]. , 2014.
|
[9] |
Kaminsky A, Kurdziel M, Radziszowski S.An overview of cryptanalysis research for the advanced encryption standard[C]//MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010. IEEE, 2010: 1310-1316.
|
[10] |
VMware, Inc. VMware Horizon View Datasheet[EB/OL]. , 2014.
|
[11] |
Marlos S, Antonio T.Virtual desktop infrastructure (VDI) and remote infrastructure management outsourcing (RIMO) technologies for IT outsourcing: FI4VDI project[C]//Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on. IEEE, 2014: 1-2.
|
[12] |
Samsung, Inc. White Paper : An Overview of Samsung KNOX[EB/OL]. , 2013.
|
[13] |
Dua R, Raja A R, Kakadia D.Virtualization vs Containerization to Support PaaS[C]//Cloud Engineering (IC2E), 2014 IEEE International Conference on. IEEE, 2014: 610-614.
|
[14] |
百度百科.虚拟化技术[EB/OL]. .
|
[15] |
VMware:2010年完成手机虚拟化技术[EB/OL]. , 2009-05-20.
|
[16] |
POWER. LG为Android手机添VMware虚拟化技术[EB/OL]. , 2010-12-08.
|
[17] |
通信世界网. Red Bend市场稳步增长手机虚拟化技术加速落地[EB/OL]., 2014-09-23.
|
[18] |
Barr K, Bungale P, Deasy S, et al.The VMware mobile virtualization platform: is that a hypervisor in your pocket?[J]. ACM SIGOPS Operating Systems Review, 2010, 44(4): 124-135.
|
[19] |
Bugiel S, Davi L, Dmitrienko A, et al.Practical and lightweight domain isolation on android[C]//Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2011: 51-62.
|
[20] |
百度百科.双系统[EB/OL].
|
[21] |
Zhiyu Y, Linwei Z, Wenna L.Study on Security Strategy of Wireless Mobile Office System [C]//2009 First International Workshop on Education Technology andComputer Science. 2009, 2: 495-498.
|
[22] |
百度百科.数据库管理系统层次安全技术[EB/OL]. , 2013-4-18.
|
[23] |
江飞. 数据库安全技术及其应用研究, 科技创新与应用[J]. 2014,(3):85.
|
[24] |
He J, Guan X.Research on Database Encryption of OA System[C]//Machine Vision and Human-Machine Interface (MVHI), 2010 International Conference on. IEEE, 2010: 29-32.
|
[25] |
Banuri H, Alam M, Khan S, et al.An Android runtime security policy enforcement framework[J]. Personal and Ubiquitous Computing, 2012, 16(6): 631-641.
|