Search: onr:"swepub:oai:DiVA.org:kth-152760" >
A model and design ...
A model and design of a security provider for Java applications
-
Abbasi, A. G. (author)
-
- Muftic, Sead (author)
- KTH,Kommunikationssystem, CoS
-
- Schmölzer, Gernot (author)
- KTH,Kommunikationssystem, CoS
-
(creator_code:org_t)
- IEEE, 2009
- 2009
- English.
-
In: International Conference for Internet Technology and Secured Transactions, ICITST 2009. - : IEEE. - 9781424456482 ; , s. 5402592-
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.
Subject headings
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)
Keyword
- Abstract models
- Asymmetric key cryptography
- Desktop applications
- Encapsulation methods
- Enterprise environment
- Java applications
- Network-security protocols
- Security modules
- Security protocols
- Security requirements
- Security services
- Symmetric key cryptography
- Upper layer
- Verification of signature
- Abstracting
- Cryptography
- Internet
- Internet protocols
- Java programming language
- Machine design
- Network security
Publication and Content Type
- ref (subject category)
- kon (subject category)
Find in a library
To the university's database