Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: report, full, security, database, database security issues, mobile application, data base administration, security database, database and security, database mobile, mobile database applications, data security management, database management program, android mobile applications, security in database, data security services, Mobile, Mobile database security full report,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
28-04-2011, 12:20 PM
Post: #1
Mobile database security full report
Presented by,
BASANT KUMAR


.pptx  mobile-security.pptx (Size: 1.35 MB / Downloads: 229)
NEED FOR MOBILE DATABASE
• Mobile users must be able to work without a wireless connection due to poor or even non-existent connections.
• Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems).
• Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred).
• Location Dependent Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area.
How m. d. s look at database data
• Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber.
1. Secure network connection
• The mobile database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures:
– Confidentiality of the data that is transferred.
– Authentication of the server computer.
– Authentication of the client computer.
2. Encrypted local database
The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm.
3. Application provided security
For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author
– can create new announcements that are signed with his name,
– can delete or update announcements that are signed with his name, and
– has no access to announcements created/signed by other users.
Rating Mobile database security full report Options
Share Mobile database security full report To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : database, mobile database, mobile database papers 2011, pdf security of mobile db, ppt on security in mobile database, mobile data security seminar doc, mobile database security papers 2011 pdf, latest security in mobile database systems, security in mobile database systems documentation, security in mobile database systems ppt, security in mobile database system seminar full report, security in mobile database system, secure mobile database applications seminarproj, security in mobile databases ppts, security system in mobile database application seminar, security system in mobile database application ppt, seminar on security in mobile database systems,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  UNIVERSITY MANAGEMENT SYSTEM full report project topics 22 23,874 13-12-2014 02:38 PM
Last Post: mkaasees
  REPORT ON ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD project girl 5 2,269 10-12-2014 11:10 AM
Last Post: mkaasees
  ELECTRICITY BILL MANAGEMENT SYSTEM REPORT seminar projects maker 2 295 06-12-2014 10:06 AM
Last Post: mkaasees
  Intranet Mailing System full report seminar tips 8 4,476 05-12-2014 11:36 AM
Last Post: mkaasees
  student management system full report project report tiger 63 173,024 04-12-2014 11:18 AM
Last Post: mkaasees
  ONLINE SHOPPING CART full report seminar class 11 22,410 28-11-2014 10:47 AM
Last Post: mkaasees
  air ticket reservation system full report project report tiger 25 60,725 24-11-2014 12:54 PM
Last Post: Guest
  Customer Care System using Dynamic Crystal Report seminar code 0 71 14-11-2014 02:42 PM
Last Post: seminar code
  Criminal Database System seminar code 0 55 14-11-2014 02:41 PM
Last Post: seminar code
  IT company project tracking system web & mobile seminar code 0 74 13-11-2014 04:22 PM
Last Post: seminar code
This Page May Contain What is Mobile database security full report And Latest Information/News About Mobile database security full report,If Not ...Use Search to get more info about Mobile database security full report Or Ask Here

Options: