Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Countermeasures for mobile agent security
Computer Communications
Hi-index | 0.00 |
The technology evaluation of mobile management system has integrated with significant improvement in mobile computing. The requirements for mobile security are more important when we are accessing the sensitive data from the database. Concurrency control ensures that individual users meet consistent states of the mobile databases with security. But in the IP based mobile network the relay of data is not continuous and also the connection may lose at any time. The IP alone is not suitable for identifying the mobile host inside the network. In this paper, it is proposed a model to enhance the performance of mobile security for IP based mobile host.