Designed on Information Security Systems for Mobile Databases

Article Preview

Abstract:

In this paper, the existing transmission network message transfer protocol and conducted in-depth analysis to identify which existing security measures and the presence of hidden proposed secure data transmission scheme. The program takes into account the feasibility of the existing network to transmit messages that programs load capacity, on the other hand give full consideration to the needs of users, providing different levels of security services for different users.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 915-916)

Pages:

1424-1427

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. R. Hurson, J. Ploskonka, Y. Jiao, H. Haridas: Security Issues and Solutions in Distributed Heterogeneous Mobile Database Systems, Advances in Computers, Vol. 61 (2004), pp.107-198.

DOI: 10.1016/s0065-2458(03)61003-x

Google Scholar

[2] M. Leitner, S. Rinderle-Ma: A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions, Information and Software Technology, Vol. 56 (2014), pp.273-293.

DOI: 10.1016/j.infsof.2013.12.004

Google Scholar

[3] D. G. Rosado, E. F. Medina, J. Lopez: Security services architecture for Secure Mobile Grid Systems, Journal of Systems Architecture, Vol. 57 (2011), pp.240-258.

DOI: 10.1016/j.sysarc.2010.05.009

Google Scholar

[4] H. Yin, Q. Fu, C. Lin, Z. Tan, R. Ding, Y. Lin, Y. Li, Y. Fan: Mobile Police Information System Based on Web Services, Tsinghua Science & Technology, Vol. 11 (2006), pp.1-7.

DOI: 10.1016/s1007-0214(06)70146-8

Google Scholar

[5] K. Barmpatsalou, D. Damopoulos, G. Kambourakis, V. Katos: A critical review of 7 years of Mobile Device Forensics, Digital Investigation, Vol. 10 (2013), pp.323-349.

DOI: 10.1016/j.diin.2013.10.003

Google Scholar

[6] J. Swartz: Security systems for a mobile world, Technology in Society, Vol. 25 (2003), pp.5-25.

Google Scholar

[7] D. Unal, M. U. Caglayan: A formal role-based access control model for security policies in multi-domain mobile networks, Computer Networks, Vol. 57 (2013), pp.30-350.

DOI: 10.1016/j.comnet.2012.09.018

Google Scholar

[8] S. M. Dye, K. Scarfone: A standard for developing secure mobile applications, Computer Standards & Interfaces, Vol. 36 (2014), pp.524-530.

DOI: 10.1016/j.csi.2013.09.005

Google Scholar