Abstract
During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. Effects of this new vision is currently evident in the flourishing numbers of mobile telephones and portable computing units. In this paper we investigate some issues concerning the security of mobile computing systems, within the framework of the categories of mobility, disconnection, data access modes and scale of operation (Imielinski & Badrinath, 1993). In contrast to previous works which concentrate on security in wireless communications, we focus on the security of interactions which are built upon the underlying wireless communications medium. Some conclusions are presented on the future directions for security research in mobile computing systems.
Chapter PDF
References
T. Imielinski and B. R. Badrinath, “Mobile wireless computing: Solutions and challenges in data management,” Technical Report DCS -TR-296/WINLAB-TR-49, Department of Computer Science, Rutgers University, NJ, 1992.
T. Imielinski and B. R. Badrinath, “Data management for mobile computing,” SIC-MOD RECORD, vol. 22, no. 1, pp. 34–39, 1993.
D. Brown, “Security planning for personal communications,” in Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 107–111, ACM Press, 1993.
M. J. Beller, L.-F. Chang, and Y. Yacobi, “Privacy and authentication on a portable communications system,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 6, pp. 821–829, 1993.
W. van den Broek and E. Buitenwerf, “Distributed databases for third generation mobile systems,” in Proceedings of the International Council for Computer Communication Intelligent Networks Conference (P. W. Bayliss, ed.), (Tampa, Florida), pp. 333–347, IOS Press, 1992.
B. R. Badrinath and T. Imielinski, “Replication and mobility,” in Proceedings of the 2nd IEEE Workshop on Management of Replicated Data, pp. 9–12, IEEE, November 1992.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in distributed systems: Theory and practice,” Technical Report 83, Digital Systems Research Center, February 1992.
L. Gong, “Increasing availability and security of an authentication service,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657–662, 1993.
J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security. Sydney: Prentice Hall, 1989.
T. Leighton and S. Micali, “Secret-key agreement without public-key cryptography,” in Advances in Cryptology — Proceedings of Crypto ‘83 (D. R. Stinson, ed.), vol. 773 of Lecture Notes in Computer Science, pp. 456–479, Springer-Verlag, 1993.
T. F. Keefe, W. T. Tsai, and J. Srivastava, “Multilevel secure database concurrency control,” Technical Report TR 89–45, University of Minnesota, July 1989.
S. Jajodia and B. Kogan, “Transaction processing in multilevel-secure databases using replicated architecture,” in Proceedings of the 1990 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 360–368, IEEE Computer Society, 1990.
T. Imielinski, S. Viswanathan, and B. R. Badrinath, “Data on the air — organization and access,” technical report, Department of Computer Science, Rutgers University, NJ, 1992. (available from ftp riches. rutgers. edu).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hardjono, T., Seberry, J. (1995). Information Security Issues in Mobile Computing. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive