Title :
The analysis of the security strategy of embedded mobile database
Author :
Wang, Huaixiang ; Dang, Deyu ; Min, Shi
Author_Institution :
Sch. of Inf. Eng., Northeast Dianli Univ., Jilin, China
Abstract :
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be viaalilowo, the database Encryption must be enhanced, the audit, backups, and recover must be taken into account, the mobile client authentication should be enhanced and the wireless transmission must be encrypted.
Keywords :
authorisation; cryptography; database management systems; embedded systems; mobile computing; access control mechanism; backend database; database encryption; embedded mobile database; mobile client; security strategy; wireless network; Authentication; Conferences; Cryptography; Databases; Industries; Wireless communication; Wireless sensor networks; embedded mobile database; the safety problems; the security policy;
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
DOI :
10.1109/ICCSIT.2010.5564079