Browse > Article
http://dx.doi.org/10.7236/JIIBC.2014.14.2.87

Application Study applied to the Encryption at Virtualization Launcher  

Lim, Seung-Cheol (Dept. of Computer Information Science, Woosong University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.14, no.2, 2014 , pp. 87-92 More about this Journal
Abstract
Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.
Keywords
Smartphone; Mobile Visualization; Encryption; Security; Launcher;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Se-jung Lim, Gwang-jun Kim, Tae-geun Kang "Application Program Virtualization based on Desktop Virtualization", The korea institute of electronic communication sciences, Vol.5, No.6, 2010   과학기술학회마을
2 SILBERSCHATZ "Operating System Principles 7/E", Wiley 2005
3 VMware, Inc. "Understanding Full Virtu-alization, Paravirtualization, and Hardware Assist", White Paper, Nov. 2007
4 Mark Murphy "Beginning Android3", Apress 2012
5 Barret Rhoden, Kevin Klus, David Zhu, Eric Brewer "Improving Per-Node Efficiency in the Datacenter with New OS Abstractions", ACM 2011
6 B Weinberg, L Pundit "Designing and Deploying with Mobile Virtualization", Whitepaper. Linux Pundit 2009
7 Mohammad Nauman, Sohail Khan "Design and implementation of a fine-grained resource usage model for the android platform", The International Arab Journal of Information Technology 2011
8 Eun-Sook Cho, Chul-Jin Kim, and Sook-Hee Lee, "A Modeling Technique for Development of Mobile App. based on Android", Journal of the Korea Academia-Industrial cooperation Society, vol. 14 No. 8, pp.3999-4005, Auguest 2013.   과학기술학회마을   DOI   ScienceOn
9 Google, Inc. "Android 4.2 API: Multiple Users", http://developer.android.com/about/versions/android-4.2.html 2012
10 S.J. OH, "Design of a Middleware for Android-based Smart Phone Applications", Journal of Korean Institute of Information Technology, vol. 12, issue 2, pp. 111-117, Apr 2012.   과학기술학회마을   DOI   ScienceOn
11 Jae-Man You, In-Kyoo Park "Android Storage Access Control for Personal Information Security", Journal of The Institute of Internet, Broadcasting and Communication, vol. 13 No. 6, pp.123-129, December 2013.   과학기술학회마을   DOI   ScienceOn
12 Nelson Ruest, Danielle Ruest "Virtualization, A Beginner's Guide", McGraw-Hill 2009
13 Sun-Hyang Jang., Su-ji Hwang, Young-Hyun Chang, Min-jeong Koo "Study on the Enhancement of the Credibility of Android OS based Applications", Journal of IWIT, Vol.11, No.3, pp.382-384, fall 2012.