Java security architecture and extensions

Uloženo v:
Podrobná bibliografie
Název: Java security architecture and extensions
Autoři: Roth, V.
Rok vydání: 2002
Sbírka: Publikationsdatenbank der Fraunhofer-Gesellschaft
Témata: Java Development Kit, Java Cryptography Architecture, Java Cryptography Extension, crypto-enabled software, provider-independent layer, Java security architecture
Time: 006, 005
Popis: S.34-38 ; Unfortunately, we are not in the best of worlds and building industry- strength crypto-enabled software based on the available providers is problematic. Problems are caused by shortcomings in the JCA/JCE (Java Cryptography Architecture/Java Cryptography Extension), which are in turn exacerbated by sloppy implementation and interpretation of the API and implementation guidelines. I present techniques for building providers in an interoperable fashion, identifying mistakes to avoid. I also outline the scope of applications that should be feasible to implement based on a provider-independent layer-in particular, the JCA/JCE. ; 27 ; Nr.4
Druh dokumentu: article in journal/newspaper
Jazyk: English
Relation: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750
Dostupnost: https://publica.fraunhofer.de/handle/publica/202750
Přístupové číslo: edsbas.F945DB34
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://publica.fraunhofer.de/handle/publica/202750#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Roth%20V
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.F945DB34
RelevancyScore: 761
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 760.684326171875
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Java security architecture and extensions
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Roth%2C+V%2E%22">Roth, V.</searchLink>
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2002
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: Publikationsdatenbank der Fraunhofer-Gesellschaft
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Java+Development+Kit%22">Java Development Kit</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Cryptography+Architecture%22">Java Cryptography Architecture</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Cryptography+Extension%22">Java Cryptography Extension</searchLink><br /><searchLink fieldCode="DE" term="%22crypto-enabled+software%22">crypto-enabled software</searchLink><br /><searchLink fieldCode="DE" term="%22provider-independent+layer%22">provider-independent layer</searchLink><br /><searchLink fieldCode="DE" term="%22Java+security+architecture%22">Java security architecture</searchLink>
– Name: Subject
  Label: Time
  Group: Su
  Data: 006<br />005
– Name: Abstract
  Label: Description
  Group: Ab
  Data: S.34-38 ; Unfortunately, we are not in the best of worlds and building industry- strength crypto-enabled software based on the available providers is problematic. Problems are caused by shortcomings in the JCA/JCE (Java Cryptography Architecture/Java Cryptography Extension), which are in turn exacerbated by sloppy implementation and interpretation of the API and implementation guidelines. I present techniques for building providers in an interoperable fashion, identifying mistakes to avoid. I also outline the scope of applications that should be feasible to implement based on a provider-independent layer-in particular, the JCA/JCE. ; 27 ; Nr.4
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750
– Name: URL
  Label: Availability
  Group: URL
  Data: https://publica.fraunhofer.de/handle/publica/202750
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.F945DB34
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.F945DB34
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Java Development Kit
        Type: general
      – SubjectFull: Java Cryptography Architecture
        Type: general
      – SubjectFull: Java Cryptography Extension
        Type: general
      – SubjectFull: crypto-enabled software
        Type: general
      – SubjectFull: provider-independent layer
        Type: general
      – SubjectFull: Java security architecture
        Type: general
    Titles:
      – TitleFull: Java security architecture and extensions
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Roth, V.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2002
          Identifiers:
            – Type: issn-locals
              Value: edsbas
ResultId 1