Security Issues for JME M-Applications

نویسنده

  • Catalin BOJA
چکیده

The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them. Key-Words: M-applications, JME platform, mobile architectures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Do research ethics committees identify process errors in applications for ethical approval?

We analysed research ethics committee (REC) letters. We found that RECs frequently identify process errors in applications from researchers that are not deemed "favourable" at first review. Errors include procedural violations (identified in 74% of all applications), missing information (68%), slip-ups (44%) and discrepancies (25%). Important questions arise about why the level of error identif...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Directions for Web and E-Commerce Applications Security

This paper provides directions f o r web and ecommerce applications security. In particular, access contra1 policies, workflow security, X M L security arid federated database security issues pertaining to the web and e-commerce applications are discussed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011