Security Issues in a Mobile Computing Paradigm

In this paper, we discuss operational and security issues arising from the use of mobile components in distributed systems. We argue that mobile agents can be used to overcome intrinsic problems of wireless networking. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. We also discuss security problems and mechanisms that can be applied to each one of the three main components of our mobile computing model, which is intended to be implemented in a health care paradigm, where special conditions and emergency needs are imposing the use of services supported with mobile computing.

[1]  John Zahorjan,et al.  The challenges of mobile computing , 1994, Computer.

[2]  Tomasz Imielinski,et al.  Mobile Wireless Computing: Solutions and Challenges in Data Management , 1993 .

[3]  Mark Weiser The computer for the 21st century , 1991 .

[4]  Roy H. Campbell,et al.  Mobile Computing, Security and Delegation , 1994 .

[5]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[6]  G Pangalos,et al.  A generic methodology for health care data security. , 1994, Medical informatics = Medecine et informatique.

[7]  Emil C. Lupu,et al.  Role-based security for distributed object systems , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[8]  Randy H. Katz,et al.  Adaptation and mobility in wireless information systems , 2002, IEEE Communications Magazine.

[9]  G. T. Gangemi,et al.  Computer Security Basics , 2006 .

[10]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[11]  Jennifer Seberry,et al.  Information security issues in mobile computing , 1995 .

[12]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[13]  George Cybenko,et al.  Mobile agents for mobile computing , 1996 .

[14]  Roland Sauerbrey,et al.  Biography , 1992, Ann. Pure Appl. Log..

[15]  Vijay Varadharajan Distributed Object Systems Security , 1995 .

[16]  D. Duchamp Issues in wireless mobile computing , 1992, [1992] Proceedings Third Workshop on Workstation Operating Systems.

[17]  José Vázquez-Gómez,et al.  Multidomain security , 1994, Comput. Secur..

[18]  Marvin Theimer,et al.  Scalable, secure, mobile computing with location information , 1993, CACM.

[19]  G Pangalos,et al.  An integrated secure design of a medical database system. , 1995, Medinfo. MEDINFO.

[20]  Nikolaos Yialelis Domain-based security for distributed object systems , 1996 .

[21]  Evaggelia Pitoura,et al.  Data Management for Mobile Computing , 1997, The Kluwer International Series on Advances in Database Systems.