Security Issues for JME M-Applications
نویسنده
چکیده
The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them. Key-Words: M-applications, JME platform, mobile architectures.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملDo research ethics committees identify process errors in applications for ethical approval?
We analysed research ethics committee (REC) letters. We found that RECs frequently identify process errors in applications from researchers that are not deemed "favourable" at first review. Errors include procedural violations (identified in 74% of all applications), missing information (68%), slip-ups (44%) and discrepancies (25%). Important questions arise about why the level of error identif...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملDirections for Web and E-Commerce Applications Security
This paper provides directions f o r web and ecommerce applications security. In particular, access contra1 policies, workflow security, X M L security arid federated database security issues pertaining to the web and e-commerce applications are discussed.
متن کامل