Title: Adaptation Concepts for Mobile Database Security
نویسنده
چکیده
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous , and replicated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standard protection mechanisms don't work very well in such an environment. This paper presents various possibilities of an adaptation in order to adjust security to the changing context dynamically and consider characteristics of the data. The purpose is to achieve both, suitable protection and saving mobile resources.
منابع مشابه
Database Security Meets Mobile Requirements
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...
متن کاملApplying Generalized Snapshot Isolation to Mobile Databases
Mobile devices that host embedded database systems are becoming a commonality. Transaction management is needed to provide mobile data availability and transaction processing functionality during disconnection periods. In this paper, we present an adaptation of the transaction correctness criterion GSI to mobile networks that reduces the number of message exchanged per transaction. We discuss t...
متن کاملApplying Generalized Snapshot Isolation to Mobile Databases
Mobile devices that host embedded database systems are becoming a commonality. Transaction management is needed to provide mobile data availability and transaction processing functionality during disconnection periods. In this paper, we present an adaptation of the transaction correctness criterion GSI to mobile networks that reduces the number of message exchanged per transaction. We discuss t...
متن کاملSecurity Adaptation Components for Mobile Communication
Mobile computing and communication develops into an important factor in business, but it is accompanied with new security threats. The main problem lies on the one hand in the heterogeneity, dynamics and scarcity of the resources and on the other hand in the additional information like user location. In this paper, we investigate some issues concerning security of mobile computing systems, whic...
متن کاملBridging the Gap Between Semantic Planning and Continuous Control for Mobile Manipulation Using a Graph-Based World Representation
We present our ongoing efforts to create a mobile manipulation database tool, a flexible multi-modal representation supporting persistent life-long adaptation for autonomous service robots in every-day environments. Its application to a prototypical domain illustrates how it provides symbol grounding to a reasoning system capable of learning new concepts, couples semantic planning with whole-bo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007