Mobile databases security

Katarzyna Harężlak


The mobile distributed system architecture analysis concerning mechanisms guaranteeing the data safety was presented in the paper. This analysis can constitute a set of guidelines for developers and administrators of such systems. The research environment was created with usage of Microsoft Tools – IIS, SQL Server 2008 and SQL Server Mobile.


mobile databases; data security; data replication

Full Text:

PDF (Polski)


Bernard G., Ben-Othman J., Bouganim L., Canals G. i inni: Mobile Databases: A Report on Open Issues and Research Directions, ACM SIGMOD, 2003.

Drosatos G., Efraimidis P. S.,KarakosA A.,: Secure Mobile Database Application, http//, 2009.

Karbowski M.: Podstawy kryptografii. Wydanie II, Helion, Gliwice 2007.

Neto M. C.T., Salgado A.C.: Hoarding and prefeching fro mobile databases, Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006.

Saha D., Chowdhury N.: A Method for Secure Query Processing in Mobile Databases,, 2009.

Ślusarczyk P:. Systemy mobilnych baz danych jako szczególne systemy przetwarzania rozproszonego. Bazy danych - struktury, algorytmy, metody, Praca zbiorowa pod redakcją: S. Kozielskiego, B. Małysiak, P. Kasprowskiego, D. Mrożka. ISBN 83-206-1611-5, m 2, WKŁ, 2006.

Xia Y., A. Helal.: A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration, 31st Annual International Computer Software and Applications Confenrence- Cover, SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, New York, 2003.

Local Authentication Subsystem, 2009.

Poziom bezpieczeństwa w firmach:, 2009.

SQL Server Replication,, 2009.

Threat modeling:, 2009.

Zbiór artykułów na temat mobilnych baz danych w http://download-,2009

Zbiór artykułów na temat mobilnych baz danych: pdf.html, 2009