Title : 
Security in mobile systems
         
        
            Author : 
Subramanyam, V. ; Joshi, A.
         
        
            Author_Institution : 
Dept. of Comput. Eng. & Comput. Sci., Missouri Univ., Columbia, MO, USA
         
        
        
        
        
        
            Abstract : 
Mobile computing has become popular over the last few years. Users need to have continuous access to information even when they are mobile, e.g., a doctor may need to constantly monitor a patient´s health or a stock broker may need periodic information about the stock market, etc. Communication in such cases is typically over wireless links and it becomes critical to ensure secure message exchange. The traditional goals of secure computing have been to achieve confidentiality, integrity, availability, legitimacy and accountability. Messages exchanged between two hosts are usually coded by using symmetric or asymmetric ciphers, which makes it difficult for them to be seen by an outsider. This paper discusses issues concerned with mobility in a network and extensions of existing security schemes.
         
        
            Keywords : 
data privacy; mobile computing; security of data; wireless LAN; accountability; asymmetric ciphers; data availability; data confidentiality; data integrity; information access; legitimacy; mobile computing; mobile systems security; secure message exchange; symmetric ciphers; wireless links; Authentication; Communication system security; Computer science; Computer security; Mobile communication; Mobile computing; Network servers; Patient monitoring; Protocols; Stock markets;
         
        
        
        
            Conference_Titel : 
Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on
         
        
            Conference_Location : 
West Lafayette, IN, USA
         
        
        
            Print_ISBN : 
0-8186-9218-9
         
        
        
            DOI : 
10.1109/RELDIS.1998.740532