SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:kth-152760"
 

Search: onr:"swepub:oai:DiVA.org:kth-152760" > A model and design ...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

A model and design of a security provider for Java applications

Abbasi, A. G. (author)
Muftic, Sead (author)
KTH,Kommunikationssystem, CoS
Schmölzer, Gernot (author)
KTH,Kommunikationssystem, CoS
 (creator_code:org_t)
IEEE, 2009
2009
English.
In: International Conference for Internet Technology and Secured Transactions, ICITST 2009. - : IEEE. - 9781424456482 ; , s. 5402592-
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)

Keyword

Abstract models
Asymmetric key cryptography
Desktop applications
Encapsulation methods
Enterprise environment
Java applications
Network-security protocols
Security modules
Security protocols
Security requirements
Security services
Symmetric key cryptography
Upper layer
Verification of signature
Abstracting
Cryptography
Internet
Internet protocols
Java programming language
Machine design
Network security

Publication and Content Type

ref (subject category)
kon (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Find more in SwePub

By the author/editor
Abbasi, A. G.
Muftic, Sead
Schmölzer, Gerno ...
About the subject
ENGINEERING AND TECHNOLOGY
ENGINEERING AND ...
and Electrical Engin ...
and Communication Sy ...
Articles in the publication
International Co ...
By the university
Royal Institute of Technology

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view