Abstract
In this paper, we discuss operational and security issues arising from the use of mobile components in distributed systems. We argue that mobile agents can be used to overcome intrinsic problems of wireless networking. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. We also discuss security problems and mechanisms that can be applied to each one of the three main components of our mobile computing model, which is intended to be implemented in a health care paradigm, where special conditions and emergency needs are imposing the use of services supported with mobile computing.
Chapter PDF
Similar content being viewed by others
Keywords
References
Bharghavan, V. (1994) A protocol for Authentication, Data and Location Privacy, and Accounting in Mobile Computing Environments. Proceedings of the ACM Conference on Computers and Communications Security, Fairfax, Virginia.
Campbell, R.; Sturman, D. and Tock, T. (1994) Mobile Computing, Security and Delegation. International Workshop on Multi-Dimensional Mobile Communications, Japan.
Chang, D.T. and Lange, D.B. Mobile Agents: A New Paradigm for Distributed Object Computing on the WWW. Submitted to OOPSLA ’86 Workshop Toward the Integration of WWW and Distributed Object Technology, also available at URL http://www.trLibm.cojn/a_glets/ma.html.
Duchamp, D. (1992) Issues in Wireless Mobile Computing. Proceedings Third Workshop on Workstation Operating Systems, April 1992, 2–10.
Forman, G.H. and Zahorian, J. (1994) The Challenges of Mobile Computing. IEEE Computer, April 1994, 38–47.
Furnell, S.M.; Pangalos, G.; Sanders, P.W. and Warren, M.J. (1993) A Generic Methodology for Health Care Data Security. Medical Informatics, 19 (3).
Gray, R.; Kotz, D.; Nog, S.; Rus, D. and Cybenko, G. (1996) Mobile agents for mobile computing, Technical Report PCS-TR96–285, Department of Computer Science, Dartmouth College, Hanover, available at URL ftp://ftn.cs.dartmouth.edu/TR/TR96285.ps.Z.
Hardjono, T. and Seberry, J. (1995) Information Security Issues In Mobile Computing. Information Security–the Next Decade, Proceedings of the IFIP TCI I, Eleventh International Conference On Information Security, IFIP/Sec ’85, Capetown, South Africa, Chapman and Hall, London-Melbourne, 143–151.
IBM Aglets Workbench http://www.ibm.co.ip/tr1Iaglets
Imielinski, T. and Badrinath, B.R. (1992) Mobile Wireless Computing: Solutions and Challenges in Data Management. Technical Report DCS-TR-296, Department of Computer Science, Rutgers University, NJ.
Imielinski, T. and Badrinath, B.R. (1993) Data management for mobile computing. SIGMOD RECORD, 22 (1), 34–39.
Katz, R.H. (1994) Adaptation and Mobility in Wireless Information Systems. IEEE Personal Communications, 1st Quarter, 6–17.
ORACLE Mobile Agents http://www.oracle.com
Pangalos, G.; Khair, M. and Bozios, L. (1995) An Integrated Secure Design of a Medical Database System. MEDINFO ′95, The 8th World Congress on Medical Informatics, Vancouver, Canada.
Pfitzmann, A.; Pfitzmann, B.; Schunter, M. and Waidner, M. (1996) Mobile User Devices and Security Modules: Design for Trustworthiness. IBM Technical Report RZ-2784.
Pfleeger, C. (1989) Security in Computing. Prentice-Hall International Editions.
Russel, D. (1991) Computer Security Basics. O’Reilly & Associates.
Spreitzer, M. and Theimer, M. (1993) Scalable, Secure, Mobile Computing with Location Information. Communications of the ACM, July 1993, 36 (7).
Vasquez-Gomez, J. (1994) Multidomain Security. Computers and Security, 13.
Varadharajan, V. (1995) Distributed Object Systems Security. Information Security–the Next Decade, Proceedings of the IFIP TCII, Eleventh International Conference On Information Security, IFIP/Sec ′95, Capetown, South Africa, Chapman and Hall, London-Melbourne, 305–321.
Weiser, M. (1991) The Computer for the Twenty-First Century. Scientific American, 265 (3), 94–104.
Weiser, M. (1993) Some Computer Science Issues Related to Ubiquitous Computing. Comm. ACM, 36 (7), 75–85.
Yialelis, N. (1996) Domain-Based Security for Distributed Object Systems. Thesis, Imperial College of Science.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 IFIP
About this chapter
Cite this chapter
Mavridis, I., Pangalos, G. (1997). Security Issues in a Mobile Computing Paradigm. In: Katsikas, S. (eds) Communications and Multimedia Security. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35256-5_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-35256-5_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2918-3
Online ISBN: 978-0-387-35256-5
eBook Packages: Springer Book Archive