Abstract
Mobile computing and communication is a rapidly developing area. But mobility is associated with problems for security and privacy beyond those in open networks. A well known threat is tracking user movements. New risks are caused by the mobility of users, the portability of computers, and wireless links which include dynamics, resource dependencies and additional information to ensure the communication. This paper surveys the new challenges and the research on security issues in mobile data management, access and transfer. We investigate the issues concerning database specific security which have to be reconsidered. We will identify a basic characteristic of these security issues, adaptability, to answer the dynamics.
Chapter PDF
Similar content being viewed by others
References
Arbeitskreis Technik der Datenschutzbeauftragten, Schwerin. Privacy Friendly Technologies (in GERMAN), 1998.
D. Chaum. Untraceable electronic mail. Communications of the ACM, 24 (2): 84–88, 1981.
D.A. Cooper and K.P. Birman. The design and implementation of a private message service for mobile computers. Wireless Networks, 1 (3): 297–310, 1995.
Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and the free movement of such data, 1995.
A. Fasbender, D. Kesdogan, and O. Kubitz. Variable and scalable security: Protection of location information in mobile IP. In Proc. of the 46th IEEE Vehicular Technology Society Conference, Atlanta, 1996.
H. Federrath, A. Jerichow, D. Kesdogan, A. Pfitzmann, and D. Trossen. Minimizing the average cost of paging on the air interface - an approach considering privacy. In Proc. of the IEEE 47th Annual Vehicular International Technology Conference(VTC97), 1997.
T. Hardjono and J. Seberry. Information issues in mobile computing. In J.H.P. Eloff and S.H. von Solms, editors, Proc. of the IFIP TC 11 Int. Conf. on information security, IFIP/Sec’95, London, 1995. Chapman and Hall.
A. Herzberg, H. Krawczyk, and G. Tsudik. On travelling incognito. In Proc. of the IEEE WS on Mobile Systems and Applications, 1994.
A. Heuer and A. Lubinski. Database access in mobile environments. In Proc. of the Database and Expert Systems Applications (DEXA’96), 1996.
T. Imielinski and B.R. Badrinath. Data management for mobile computing. SIGMOD RECORD, 22 (1): 34–39, 1993.
In G. Weck and P. Horster, editors, Proc. of the VIS ‘83 (Reliable Information Systems), 1993.
R. Molva, D. Samfat, and G. Tsudik. Authentication of mobile users. IEEE Network, Special Issue on Mobile Communication, 1994.
I. Nurkic. Difficulties in achieving security in mobile communications. In Proc. of the IFIP World Conference on Mobile Communications, 1996.
A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN—MIXes: Untraceable communication with very small bandwidth overhead. In Proc. Of the IFIP/Sec’911991
M. Reichenbach, H. Damker, H. Federrath, and K. Rannenberg. Individual management of personal reachability in mobile communication. In Proceedings of the IFIP TC11 SEC 97, 13th International Information Security Conference, 1997.
D. Sayer. The erosion of privacy and security in public telecommunication networks: Growing significance of telemetadata in advanced communication services. Working Paper 13, European Commission’s FAIR project, Sussex, 1997.
V. Varadharajan and Y. Mu. Design of secure end-to-end protocols for mobile systems. In Proc. of the IFIP World Conference on Mobile Communications, Canberra, 1996.
Y. Zheng. An authentication and security protocol for mobile computing. In Proc. of the IFIP World Conference on Mobile Communications, Canberra, 1996.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media New York
About this chapter
Cite this chapter
Lubinski, A. (1999). Security Issues in Mobile Database Access. In: Jajodia, S. (eds) Database Security XII. IFIP — The International Federation for Information Processing, vol 14. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35564-1_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-35564-1_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4914-4
Online ISBN: 978-0-387-35564-1
eBook Packages: Springer Book Archive