The analysis of the security strategy of embedded mobile database | IEEE Conference Publication | IEEE Xplore