DocumentCode :
1940155
Title :
The analysis of the security strategy of embedded mobile database
Author :
Wang, Huaixiang ; Dang, Deyu ; Min, Shi
Author_Institution :
Sch. of Inf. Eng., Northeast Dianli Univ., Jilin, China
Volume :
6
fYear :
2010
fDate :
9-11 July 2010
Firstpage :
476
Lastpage :
478
Abstract :
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be viaalilowo, the database Encryption must be enhanced, the audit, backups, and recover must be taken into account, the mobile client authentication should be enhanced and the wireless transmission must be encrypted.
Keywords :
authorisation; cryptography; database management systems; embedded systems; mobile computing; access control mechanism; backend database; database encryption; embedded mobile database; mobile client; security strategy; wireless network; Authentication; Conferences; Cryptography; Databases; Industries; Wireless communication; Wireless sensor networks; embedded mobile database; the safety problems; the security policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
Type :
conf
DOI :
10.1109/ICCSIT.2010.5564079
Filename :
5564079
Link To Document :
بازگشت