Java security architecture and extensions
Uloženo v:
| Název: | Java security architecture and extensions |
|---|---|
| Autoři: | Roth, V. |
| Rok vydání: | 2002 |
| Sbírka: | Publikationsdatenbank der Fraunhofer-Gesellschaft |
| Témata: | Java Development Kit, Java Cryptography Architecture, Java Cryptography Extension, crypto-enabled software, provider-independent layer, Java security architecture |
| Time: | 006, 005 |
| Popis: | S.34-38 ; Unfortunately, we are not in the best of worlds and building industry- strength crypto-enabled software based on the available providers is problematic. Problems are caused by shortcomings in the JCA/JCE (Java Cryptography Architecture/Java Cryptography Extension), which are in turn exacerbated by sloppy implementation and interpretation of the API and implementation guidelines. I present techniques for building providers in an interoperable fashion, identifying mistakes to avoid. I also outline the scope of applications that should be feasible to implement based on a provider-independent layer-in particular, the JCA/JCE. ; 27 ; Nr.4 |
| Druh dokumentu: | article in journal/newspaper |
| Jazyk: | English |
| Relation: | Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750 |
| Dostupnost: | https://publica.fraunhofer.de/handle/publica/202750 |
| Přístupové číslo: | edsbas.F945DB34 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://publica.fraunhofer.de/handle/publica/202750# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Roth%20V Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.F945DB34 RelevancyScore: 761 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 760.684326171875 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Java security architecture and extensions – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Roth%2C+V%2E%22">Roth, V.</searchLink> – Name: DatePubCY Label: Publication Year Group: Date Data: 2002 – Name: Subset Label: Collection Group: HoldingsInfo Data: Publikationsdatenbank der Fraunhofer-Gesellschaft – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Java+Development+Kit%22">Java Development Kit</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Cryptography+Architecture%22">Java Cryptography Architecture</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Cryptography+Extension%22">Java Cryptography Extension</searchLink><br /><searchLink fieldCode="DE" term="%22crypto-enabled+software%22">crypto-enabled software</searchLink><br /><searchLink fieldCode="DE" term="%22provider-independent+layer%22">provider-independent layer</searchLink><br /><searchLink fieldCode="DE" term="%22Java+security+architecture%22">Java security architecture</searchLink> – Name: Subject Label: Time Group: Su Data: 006<br />005 – Name: Abstract Label: Description Group: Ab Data: S.34-38 ; Unfortunately, we are not in the best of worlds and building industry- strength crypto-enabled software based on the available providers is problematic. Problems are caused by shortcomings in the JCA/JCE (Java Cryptography Architecture/Java Cryptography Extension), which are in turn exacerbated by sloppy implementation and interpretation of the API and implementation guidelines. I present techniques for building providers in an interoperable fashion, identifying mistakes to avoid. I also outline the scope of applications that should be feasible to implement based on a provider-independent layer-in particular, the JCA/JCE. ; 27 ; Nr.4 – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750 – Name: URL Label: Availability Group: URL Data: https://publica.fraunhofer.de/handle/publica/202750 – Name: AN Label: Accession Number Group: ID Data: edsbas.F945DB34 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.F945DB34 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: Java Development Kit Type: general – SubjectFull: Java Cryptography Architecture Type: general – SubjectFull: Java Cryptography Extension Type: general – SubjectFull: crypto-enabled software Type: general – SubjectFull: provider-independent layer Type: general – SubjectFull: Java security architecture Type: general Titles: – TitleFull: Java security architecture and extensions Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Roth, V. IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2002 Identifiers: – Type: issn-locals Value: edsbas |
| ResultId | 1 |
Nájsť tento článok vo Web of Science