Search Results - Java security provider
-
1
A model and design of a security provider for Java applications
ISBN: 1424456479, 9781424456475, 9781424456482, 1424456487Published: IEEE 01.11.2009Published in ICITST : 2009 International Conference for Internet Technology and Secured Transactions : 9-12 November 2009 (01.11.2009)“…The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications…”
Get full text
Conference Proceeding -
2
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL
ISSN: 0164-1212, 1873-1228Published: New York Elsevier Inc 01.05.2006Published in The Journal of systems and software (01.05.2006)“… The overheads related to the usage of security and the influences of JCE (Java Cryptography Extension…”
Get full text
Journal Article -
3
Some Computer Security Providers Warn of Issues With Oracle's Java -Reuters
Published: New York Dow Jones & Company Inc 10.01.2013Published in Dow Jones Institutional News (10.01.2013)Get full text
Newsletter -
4
Java JCA/JCE programming in Android with SD smart cards
ISBN: 146732843X, 9781467328432ISSN: 2166-0727Published: IEEE 01.06.2012Published in 7th Iberian Conference on Information Systems and Technologies (CISTI 2012) (01.06.2012)“…The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone…”
Get full text
Conference Proceeding -
5
Organizing Security Patterns
ISSN: 0740-7459, 1937-4194Published: Los Alamitos, CA IEEE 01.07.2007Published in IEEE software (01.07.2007)“… However, the old ways of ensuring software systems' security and reliability are inadequate on the Internet…”
Get full text
Journal Article -
6
GemStone Systems Offers Industry's Most Comprehensive Implementation of Enterprise-Class Security in Enterprise Javabeans Application Server
Published: New York Business Wire 08.12.1998Published in Business Wire (08.12.1998)“…(tm) (JDK) 1.2 security standards and integrates Secured Socket Layer (SSL) technology from Phaos Technology, a leading Java security provider. GemStone/J…”
Get full text
Newsletter -
7
Blockchain-based healthcare management system with two-side verifiability
ISSN: 1932-6203, 1932-6203Published: United States Public Library of Science 14.04.2022Published in PloS one (14.04.2022)“… A standard solution is outsourcing the electronic health record (EHR) to a cloud service provider (CSP…”
Get full text
Journal Article -
8
Engineering of web services for internet of things applications
ISSN: 1387-3326, 1572-9419Published: New York Springer US 01.04.2016Published in Information systems frontiers (01.04.2016)“…’ operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party’s database access…”
Get full text
Journal Article -
9
A novel data logging framework to enhance security of Cloud computing
ISSN: 1558-058XPublished: IEEE 01.03.2016Published in Proceedings of IEEE Southeastcon (01.03.2016)“…Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the Cloud…”
Get full text
Conference Proceeding Journal Article -
10
Spring Framework Benchmarking Utility for Static Application Security Testing (SAST) Tools
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.11.2025Published in IEEE internet of things journal (15.11.2025)“…Software developers face several challenges when creating or maintaining applications, security assurance is one…”
Get full text
Journal Article -
11
JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures
ISSN: 2523-3963, 2523-3971Published: Cham Springer International Publishing 01.01.2020Published in SN applied sciences (01.01.2020)“… However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk…”
Get full text
Journal Article -
12
Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices
ISSN: 1045-9219, 1558-2183Published: New York IEEE 01.09.2004Published in IEEE transactions on parallel and distributed systems (01.09.2004)“…Java-enabled wireless devices are preferred for various reasons. For example, users can dynamically download Java applications on demand…”
Get full text
Journal Article -
13
A Java cryptography service provider implementing one-time pad
ISBN: 0769520561, 9780769520568Published: IEEE 2004Published in System Sciences: Abstracts of Full Papers, Proceedings 37th International Conference, Hilton Waikoloa Village, Hawaii, 2004 (2004)“…Security is a challenging aspect of communications today that touches many areas including memory space, processing speed, code development and maintenance issues…”
Get full text
Conference Proceeding -
14
PolicyPak Addresses Java Security Concerns
Published: Amman Disco Digital Media, Inc 08.03.2017Published in ICT Monitor Worldwide (08.03.2017)“…) solutions for Windows desktops, today introduced its new Java Rules Manager. Once application security settings are defined, PolicyPak Suite of products work with an organization…”
Get full text
Newsletter -
15
Privacy-Aware Web Service Composition and Ranking
ISSN: 1545-7362, 1546-5004Published: Hershey IGI Global 01.07.2013Published in International journal of web services research (01.07.2013)“…Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers…”
Get full text
Journal Article -
16
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.03.2022Published in IEEE transactions on dependable and secure computing (01.03.2022)“…To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP…”
Get full text
Journal Article -
17
New metrics to modify BGP routes based on SDN
ISSN: 1022-0038, 1572-8196Published: New York Springer US 01.11.2020Published in Wireless networks (01.11.2020)“…, for example, security…”
Get full text
Journal Article -
18
Perceptions about pasung (physical restraint and confinement) of schizophrenia patients: a qualitative study among family members and other key stakeholders in Bogor Regency, West Java Province, Indonesia 2017
ISSN: 1752-4458, 1752-4458Published: London BioMed Central 25.06.2018Published in International journal of mental health systems (25.06.2018)“… . Objective To explore the perceptions of family members of patients of schizophrenia and other key stakeholders concerning pasung in Bogor Regency, West Java Province 2017…”
Get full text
Journal Article -
19
Exploring Web of Things with Embedded Devices
ISSN: 0975-0290, 0975-0282Published: Eswar Publications 01.11.2015Published in International journal of advanced networking and applications (01.11.2015)“…In recent years IoT (Internet of Things) is gaining interest among researchers and many IoT development platforms, SDK's have been proposed. There are lots of…”
Get full text
Journal Article -
20
A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards
ISSN: 1999-5903, 1999-5903Published: Basel MDPI AG 01.06.2023Published in Future internet (01.06.2023)“… challenges to balance customer experience, security, and the self-control over personal identity…”
Get full text
Journal Article

