Secure access schemes in mobile database systems

被引:7
|
作者
Hwang, MS
Lee, CH
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Universal Exchange Inc, Taipei, Taiwan
来源
关键词
encryption; mobile computing; mobile database system; security;
D O I
10.1002/ett.4460120407
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile computing is a newly emerging computing paradigm. Whether using the term mobile database system or some other form, the database concept is essential to the mobile computing environment. This work employs a more thorough yet general means of defining the mobile database system, along with several application scenarios. Possible secure access schemes are also presented for databases in a mobile computing environment. The tradeoffs of these schemes are also analyzed. Moreover, the feasibility of applying some possible secure access methods is explored, along with the potential difficulties and unresolved issues. Finally, concluding remarks and recommendations for future works are made.
引用
收藏
页码:303 / 310
页数:8
相关论文
共 50 条
  • [31] Watermarking Schemes to Secure the Face Database and Test Images in a Biometric System
    Agarwal, Himanshu
    Raman, Balasubramanian
    Atrey, Pradeep K.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (IEEE ICSIPA 2013), 2013, : 128 - 133
  • [32] A secure card solution for remote access for mobile workforce
    Kato, T
    Tsunehiro, T
    Tsunoda, M
    Muramatsu, A
    Miyake, J
    [J]. ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, : 314 - 315
  • [33] Mobile Systems Secure State Management
    Amato, Paolo
    Izzo, Niccolo
    Meijer, Carlo
    [J]. 2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 564 - 571
  • [34] Trust Relationships in Secure Mobile Systems
    Li, Tao
    Hu, Aiqun
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1882 - 1887
  • [35] Fair and Secure Mobile Billing Systems
    Shiqun Li
    Guilin Wang
    Jianying Zhou
    Kefei Chen
    [J]. Wireless Personal Communications, 2009, 51 : 81 - 93
  • [36] Secure, Dynamic and Distributed Access Control Stack for Database Applications
    Pereira, Oscar Mortagua
    Regateiro, Diogo Domingues
    Aguiar, Rui L.
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1703 - 1708
  • [37] Study on Mandatory Access Control in a Secure Database Management System
    ZHU Hong
    [J]. Advances in Manufacturing, 2001, (04) : 299 - 307
  • [38] MULTILEVEL SECURE DATABASE-MANAGEMENT SYSTEMS
    VETTER, LL
    MAIMONE, B
    [J]. AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, : 924 - 927
  • [39] Design and implementation of secure medical database systems
    Pangalos, GJ
    [J]. MEDICAL INFORMATICS, 1995, 20 (03): : 265 - 277
  • [40] Towards secure object oriented database systems
    Bai, Y
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2002: COOPLS, DOA, AND ODBASE, 2002, 2519 : 1118 - 1131