Secure access schemes in mobile database systems

被引:7
|
作者
Hwang, MS
Lee, CH
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Universal Exchange Inc, Taipei, Taiwan
来源
关键词
encryption; mobile computing; mobile database system; security;
D O I
10.1002/ett.4460120407
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile computing is a newly emerging computing paradigm. Whether using the term mobile database system or some other form, the database concept is essential to the mobile computing environment. This work employs a more thorough yet general means of defining the mobile database system, along with several application scenarios. Possible secure access schemes are also presented for databases in a mobile computing environment. The tradeoffs of these schemes are also analyzed. Moreover, the feasibility of applying some possible secure access methods is explored, along with the potential difficulties and unresolved issues. Finally, concluding remarks and recommendations for future works are made.
引用
收藏
页码:303 / 310
页数:8
相关论文
共 50 条
  • [1] Air interface access schemes for broadband mobile systems
    Prögler, M
    Evci, C
    Umehira, M
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 106 - 115
  • [2] Database access in mobile environments
    Heuer, A
    Lubinski, A
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 1996, 1134 : 544 - 553
  • [3] Mobile access to a cardiology database
    Vassányi, I
    Mógor, E
    Szakolczai, K
    Tarnay, K
    [J]. MEDINFO 2001: PROCEEDINGS OF THE 10TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 2001, 84 : 881 - 881
  • [4] Architecture for the interaction and access on multimedia database systems in the context of mobile environments
    Flach, G
    Günther, N
    [J]. 2000 INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM - PROCEEDINGS, 2000, : 224 - 230
  • [5] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    [J]. DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [6] Strong and Provably Secure Database Access Control
    Guarnieri, Marco
    Marinovic, Srdjan
    Basin, David
    [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 163 - 178
  • [7] Research on spatial database a secure access mechanism
    Zeng, Yi-Hong
    Wei, Zu-Kuan
    Yin, Qian
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2174 - +
  • [8] DATABASE ACCESS SYSTEMS
    DALRYMPLE, PW
    RODERER, NK
    [J]. ANNUAL REVIEW OF INFORMATION SCIENCE AND TECHNOLOGY, 1994, 29 : 137 - 178
  • [9] Database and location management schemes for mobile communications
    Hac, A
    Liu, B
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 1998, 6 (06) : 851 - 865
  • [10] Mobile database systems
    Maini, Siddharth
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2008, 44 (01) : 405 - 407