Mobile databases security

Katarzyna Harężlak

Abstract


The mobile distributed system architecture analysis concerning mechanisms guaranteeing the data safety was presented in the paper. This analysis can constitute a set of guidelines for developers and administrators of such systems. The research environment was created with usage of Microsoft Tools – IIS, SQL Server 2008 and SQL Server Mobile.

Keywords


mobile databases; data security; data replication

Full Text:

PDF (Polski)

References


Bernard G., Ben-Othman J., Bouganim L., Canals G. i inni: Mobile Databases: A Report on Open Issues and Research Directions, ACM SIGMOD, 2003.

Drosatos G., Efraimidis P. S.,KarakosA A.,: Secure Mobile Database Application, http//polis.ee.duth.gr/dros/files/SecMobDB.pdf, 2009.

Karbowski M.: Podstawy kryptografii. Wydanie II, Helion, Gliwice 2007.

Neto M. C.T., Salgado A.C.: Hoarding and prefeching fro mobile databases, Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006.

Saha D., Chowdhury N.: A Method for Secure Query Processing in Mobile Databases, http://www.engineeringletters.com/issues_vl4/issue_l/EL_14_l_20.pdf, 2009.

Ślusarczyk P:. Systemy mobilnych baz danych jako szczególne systemy przetwarzania rozproszonego. Bazy danych - struktury, algorytmy, metody, Praca zbiorowa pod redakcją: S. Kozielskiego, B. Małysiak, P. Kasprowskiego, D. Mrożka. ISBN 83-206-1611-5, m 2, WKŁ, 2006.

Xia Y., A. Helal.: A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration, 31st Annual International Computer Software and Applications Confenrence- Cover, SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, New York, 2003.

Local Authentication Subsystem http://msdn.microsoft.com/en-us/library/ms926467.aspx, 2009.

Poziom bezpieczeństwa w firmach: http://osnews.pl/poziom-bezpieczenstwa-w-firmach/, 2009.

SQL Server Replication, http://technet.microsoft.com/en-us/library/msl51198.aspx, 2009.

Threat modeling: http://msdn.microsoft.com/en-us/library/aa302419.aspx?, 2009.

Zbiór artykułów na temat mobilnych baz danych w download-book.net: http://download- book.net/mobile-database-pdf.html,2009

Zbiór artykułów na temat mobilnych baz danych: http://www.pdfgeni.com/book/mobileiijatabase- pdf.html, 2009




DOI: http://dx.doi.org/10.21936/si2010_v31.n2B.399