JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design and Implementation of a Mobile Middleware System for Mobile Business
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design and Implementation of a Mobile Middleware System for Mobile Business
Lee, Il-Joo;
  PDF(new window)
 Abstract
Present communication and network environment have been moving rapidly toward wireless and mobile base from existing wired internet base. This change of trend influences greatly on business methods accordingly. Therefore many enterprises are trying hard to adopt mobile business in order to gain competitive edge of their products and they are in need of more effective and stable mobile solutions. However, the method of establishing optimal mobile computing environment and how to handle existing business process and use vast amount of database are still needed. Therefore this paper tries to realize a mobile middleware system as a mobile business establishment supporting tool that could link various computational resource on wired internet with wireless LAN, mobile phone network, and mobile devices. To accomplish that specific goal, this paper provides a powerful tool of mobile and wireless application data access that could expand the line of business already set up in general enterprises easily and rapidly into mobile environment. When this suggested solution is applied in the field of industry, it can economically change legacy business process into mobile environment without having to change existing logic and resources at all.
 Keywords
mobile middleware;mobile server;mobile client;mobile business;wireless data;legacy system;
 Language
Korean
 Cited by
 References
1.
J. S. Park, M. H Park, and S. H. Jung, "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013. crossref(new window)

2.
Travis Broughton, Mobile Middleware for the Enterprise, Retrieved Oct 2013, from http://blogs.intel.com/application-security/2013/02/15/m obile-middleware-for-enterprise/

3.
Doosan Corporation, Middleware, Retrieved Oct. 2013, from http://www.doopedia.co.kr

4.
S. I. Yang, T. G. Lee, and S. H. Park, "Design of lightweight mobile middleware naive system," J. KCA, vol. 9, no. 9, pp. 41-50, 2009. crossref(new window)

5.
P. Bellavista and A. Corradi, The Handbook of Mobile Middleware, Auerbach Publications, 2007.

6.
Intel White Paper, Mobile Middleware Buyer's Guide, Retrieved Oct. 2013, from https://cloudsecurity.intel.com/

7.
Digital daily, MEAP(2011), Retrieved Aug. 2013, from http://www.ddaily.co.kr/news/news_view.php?uid=82366

8.
S. M. Lee, K. I. Seo, and E. M. Choi, "Translation and adaptation technique for mobile software using AOP," J. Korea Institute of Information Scientists and Engineers Association, vol. 37, no. 1(B), pp. 59-63, 2010.

9.
G. B. Lee, and B. S. Lee, "A study on RFID information protection with the modified ECC algorithm," J. Korea Institute of Information Scientists and Engineers Association, vol. 8, no. 3, pp. 77-85, 2010.