Outline
- Abstract
- Keywords
- 1. Introduction
- 2. Security of Mobile Device
- 2.1. Application Execution Permissions
- 2.2. On-Device Security Policies
- 2.3. Best Security Practices for Windows Mobile Devices
- 3. Security of Mobile Database
- 3.1. Distributed Databases
- 3.2. Problems, Security Challenges and Solutions for Mobile Distributed Database
- 4. Security of Mobile Network
- 5. Conclusion
رئوس مطالب
- چکیده
- کلید واژه ها
- 1. مقدمه
- 2. امنیت دستگاه موبایل
- 2.1. مجوزهای اجرای برنامه کاربردی
- 2.2. سیاست های امنیتی درون دستگاهی
- 2.3. بهترین رویه های امنیتی برای دستگاه های ویندوز موبایلی
- 3. امنیت پایگاه داده موبایل
- 3.1. پایگاه های داده توزیع شده
- 3.2. مشکلات، چالش های امنیتی و راه حل ها برای پایگاه داده توزیع شده موبایل
- 4. امنیت شبکه موبایل
- 5. نتیجه گیری
Abstract
Mobile database is a specialized class of distributed systems. There are some security challenges because of the dispersed nature of the mobile database application and hardware deviceconstraints. Therefore, the security issue of mobile database is analyzed in this paper. We will research the security in terms of mobile device, operating system on mobile device, mobile network and mobile database. Moreover, various security vulnerabilities on mobile database is recognized. Some appropriate technique is used to deal with side affect for mobile database security. For the sake of more security, Comprehensive solution that is applied to distributed database is proposed.
Keywords: mobile database - Security threats - security vulnerabilitiesConclusions
Distributed Database Security is integral to the design andfunction of a distributed database. There are three important pieces to Distributed database security; Physical, User, andNetwork. These pieces work in conjunction with policies, standards, and procedures. Policies are directions that support a goal. Solutions described above must be applied to a distributed database on a goal. Also, human factor and traits should not be ignored in this system. Because, a user as who one uses this system, would be considered as an effective factor for security. Of course, we could emphasis that only concentration on reviewed items could not be enough and for more security, during implementation would be considering an appropriate architecture.