Security Analysis of Palm PDA Computing

نویسنده

  • Gregory W. Rice
چکیده

By creating a handheld computer that succeeded where so many other palm computers had failed, Palm Computing quickly gained popularity in the personal organizer market in 1996 and 1997. Today the Palm OS accounts for over 80% of all operating systems installed on handheld computers. In the addition, over the past several years, new open documentation standards, freely available Software Development Kits, and compiler tools have led to an enormous boom in palm computer software. Today a tremendous amount of free software can be downloaded for any version of the Palm OS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Analysis of Graffiti Input and Its Application to Personal Identification

---------------------------------------------Abstract Recently, the mobile devices such as PDA and smart phones are widely used to organize personal data and to access the host systems from remote places. But, these devices are easily accessed by irregular users due to the stealge or the lost property. The authentification by password or the fingerprint can protect them, but the convenience of ...

متن کامل

Design and development of a prototype for an inexpensive multi-node mobile Palm-PDA-based wireless clinical information system platform

In this paper, we describe the design, development, and testing of an inexpensive wireless intelligent patient monitoring system. The system uses commercially-available wireless data acquisition links that operate on non-IEEE-802.x frequencies to reduce privacy and security concerns. It uses the more readily secured and robust wired Ethernet LAN to move data through the hospital to a PC-based E...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006