Browse > Article
http://dx.doi.org/10.7840/kics.2014.39B.2.102

Design and Implementation of a Mobile Middleware System for Mobile Business  

Lee, Il-Joo (동원대학교 스마트IT콘텐츠과)
Abstract
Present communication and network environment have been moving rapidly toward wireless and mobile base from existing wired internet base. This change of trend influences greatly on business methods accordingly. Therefore many enterprises are trying hard to adopt mobile business in order to gain competitive edge of their products and they are in need of more effective and stable mobile solutions. However, the method of establishing optimal mobile computing environment and how to handle existing business process and use vast amount of database are still needed. Therefore this paper tries to realize a mobile middleware system as a mobile business establishment supporting tool that could link various computational resource on wired internet with wireless LAN, mobile phone network, and mobile devices. To accomplish that specific goal, this paper provides a powerful tool of mobile and wireless application data access that could expand the line of business already set up in general enterprises easily and rapidly into mobile environment. When this suggested solution is applied in the field of industry, it can economically change legacy business process into mobile environment without having to change existing logic and resources at all.
Keywords
mobile middleware; mobile server; mobile client; mobile business; wireless data; legacy system;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. I. Yang, T. G. Lee, and S. H. Park, "Design of lightweight mobile middleware naive system," J. KCA, vol. 9, no. 9, pp. 41-50, 2009.   과학기술학회마을   DOI
2 J. S. Park, M. H Park, and S. H. Jung, "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013.   과학기술학회마을   DOI   ScienceOn
3 Travis Broughton, Mobile Middleware for the Enterprise, Retrieved Oct 2013, from http://blogs.intel.com/application-security/2013/02/15/m obile-middleware-for-enterprise/
4 Doosan Corporation, Middleware, Retrieved Oct. 2013, from http://www.doopedia.co.kr
5 P. Bellavista and A. Corradi, The Handbook of Mobile Middleware, Auerbach Publications, 2007.
6 Intel White Paper, Mobile Middleware Buyer's Guide, Retrieved Oct. 2013, from https://cloudsecurity.intel.com/
7 Digital daily, MEAP(2011), Retrieved Aug. 2013, from http://www.ddaily.co.kr/news/news_view.php?uid=82366
8 S. M. Lee, K. I. Seo, and E. M. Choi, "Translation and adaptation technique for mobile software using AOP," J. Korea Institute of Information Scientists and Engineers Association, vol. 37, no. 1(B), pp. 59-63, 2010.
9 G. B. Lee, and B. S. Lee, "A study on RFID information protection with the modified ECC algorithm," J. Korea Institute of Information Scientists and Engineers Association, vol. 8, no. 3, pp. 77-85, 2010.