Title: Adaptation Concepts for Mobile Database Security

نویسنده

  • Astrid Lubinski
چکیده

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous , and replicated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standard protection mechanisms don't work very well in such an environment. This paper presents various possibilities of an adaptation in order to adjust security to the changing context dynamically and consider characteristics of the data. The purpose is to achieve both, suitable protection and saving mobile resources.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Database Security Meets Mobile Requirements

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...

متن کامل

Applying Generalized Snapshot Isolation to Mobile Databases

Mobile devices that host embedded database systems are becoming a commonality. Transaction management is needed to provide mobile data availability and transaction processing functionality during disconnection periods. In this paper, we present an adaptation of the transaction correctness criterion GSI to mobile networks that reduces the number of message exchanged per transaction. We discuss t...

متن کامل

Applying Generalized Snapshot Isolation to Mobile Databases

Mobile devices that host embedded database systems are becoming a commonality. Transaction management is needed to provide mobile data availability and transaction processing functionality during disconnection periods. In this paper, we present an adaptation of the transaction correctness criterion GSI to mobile networks that reduces the number of message exchanged per transaction. We discuss t...

متن کامل

Security Adaptation Components for Mobile Communication

Mobile computing and communication develops into an important factor in business, but it is accompanied with new security threats. The main problem lies on the one hand in the heterogeneity, dynamics and scarcity of the resources and on the other hand in the additional information like user location. In this paper, we investigate some issues concerning security of mobile computing systems, whic...

متن کامل

Bridging the Gap Between Semantic Planning and Continuous Control for Mobile Manipulation Using a Graph-Based World Representation

We present our ongoing efforts to create a mobile manipulation database tool, a flexible multi-modal representation supporting persistent life-long adaptation for autonomous service robots in every-day environments. Its application to a prototypical domain illustrates how it provides symbol grounding to a reasoning system capable of learning new concepts, couples semantic planning with whole-bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007