Search Results - Java Secure Sockets Extension
-
1
Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.01.2019Published in Computers & security (01.01.2019)“… In this work, we evaluated the usability of Java Secure Socket Extension (JSSE) API to identify usability issues in it that persuade programmers to make mistakes while developing applications that would result in security vulnerabilities…”
Get full text
Journal Article -
2
The Java secure socket extensions: Authenticating and encrypting connections
ISSN: 1044-789XPublished: San Mateo Informa 01.02.2001Published in Dr. Dobb's Journal (01.02.2001)“… Angell discusses Java Secure Socket Extensions (JSSE) and the Java Run-Time Environment (JRE)…”
Get full text
Magazine Article Trade Publication Article -
3
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
ISSN: 1571-0661, 1571-0661Published: Elsevier B.V 01.09.2009Published in Electronic notes in theoretical computer science (01.09.2009)“… We also shortly comment on how these results can be transferred to the standard Java Secure Sockets Extension (JSSE) library that was recently open-sourced by Sun…”
Get full text
Journal Article -
4
Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation
ISSN: 0950-5849, 1873-6025Published: Elsevier B.V 01.11.2019Published in Information and software technology (01.11.2019)“…•This research evaluates the Cognitive Dimensions Framework based Usability Evaluation Methodology for security APIs by measuring its thoroughness, validity,…”
Get full text
Journal Article -
5
Session-based adaptive overload control for secure dynamic Web applications
ISBN: 9780769523804, 0769523803ISSN: 0190-3918Published: IEEE 2005Published in 2005 International Conference on Parallel Processing (ICPP'05) (2005)“… In this paper we present a session-based adaptive overload control mechanism based on SSL (secure socket layer) connections differentiation and admission control…”
Get full text
Conference Proceeding -
6
Runtime verification of cryptographic protocols
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.05.2010Published in Computers & security (01.05.2010)“…There has been a significant amount of work devoted to the static verification of security protocol designs. Virtually all of these results, when applied to an…”
Get full text
Journal Article -
7
Tracking down software bugs using automatic anomaly detection
ISBN: 158113472X, 9781581134728ISSN: 0270-5257Published: New York, NY, USA ACM 01.01.2002Published in Proceedings - International Conference on Software Engineering (01.01.2002)“…This paper introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and identifying their root causes. By…”
Get full text
Conference Proceeding Journal Article -
8
Android security internals : an in-depth guide to Android's security architecture
ISBN: 1593275811, 9781593275815, 9781593276416, 1593276419Published: San Francisco No Starch Press 2014“… application packages and employs code signing to verify their authenticityHow Android implements the Java…”
Get full text
eBook Book -
9
A secure encrypted Web platform based on RBAC heirarchical key graph
ISBN: 9780493299228, 049329922XPublished: ProQuest Dissertations & Theses 01.01.2001“… The userID/password pair or Digital Certificate is used for initial client authentication. The client/server run secure socket layer (SSL) link…”
Get full text
Dissertation -
10
Sun Microsystems: Sun Microsystems sets the standard for security in the manufacturing industry; Highly secure Solaris platform, Sun ONE software and Java technology-based applications meet manufacturers' needs in today's networked world
Published: Coventry Normans Media Ltd 03.03.2003Published in M2 Presswire (03.03.2003)“…), Java Secure Socket Extension (JSSE), and Java Authentication and Authorization Service (JAAS…”
Get full text
Newsletter -
11
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
ISSN: 1389-1286, 1872-7069Published: Amsterdam Elsevier B.V 05.08.2005Published in Computer networks (Amsterdam, Netherlands : 1999) (05.08.2005)“…We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our…”
Get full text
Journal Article -
12
Cavium Networks Accelerates Security for Web Services XML With new Java(TM) Software Development Kit
Published: New York PR Newswire Association LLC 20.06.2005Published in PR Newswire (20.06.2005)“… For more information, please visit: http://www.caviumnetworks.com Applications such as JSSE (Java Secure Socket Extensions…”
Get full text
Newsletter -
13
Tracking down software bugs using automatic anomaly detection
ISBN: 158113472X, 9781581134728Published: IEEE 2002Published in Software Engineering, 24th International Conference on ICSE 2002: IEEE Computer Society (2002)“…Introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and identifying their root causes. By instrumenting…”
Get full text
Conference Proceeding -
14
Java Tip 96: Use HTTPS in your Java client code; Find out how to use the HTTPS protocol with the standard URL class
ISSN: 1091-8906, 1091-8906Published: San Francisco Foundry 16.06.2000Published in Java world (16.06.2000)“…f you've ever tried to implement secure communication between a Java client and an HTTPS…”
Get full text
Magazine Article -
15
Conceptual design of Remote Control System for EAST tokamak
ISSN: 0920-3796, 1873-7196Published: Elsevier B.V 01.05.2014Published in Fusion engineering and design (01.05.2014)“… The Remote Control System (RCS), as an extension of the Central Control System for the EAST tokamak, is designed to provide an efficient and economical way to international collaboration…”
Get full text
Journal Article -
16
Sun Microsystems: Sun Microsystems releases the newest version of the Java 2 Platform, Standard Edition; J2SE 1.4 lays the foundation for next-generation web applications and services
Published: Coventry Normans Media Ltd 30.05.2001Published in M2 Presswire (30.05.2001)“…M2 PRESSWIRE-30 May 2001-Sun Microsystems: Sun Microsystems releases the newest version of the Java 2 Platform, Standard Edition; J2SE…”
Get full text
Newsletter -
17
PushNotify: Push server application
ISBN: 9781467345279, 146734527XPublished: IEEE 01.02.2013Published in 2013 IEEE International Advance Computing Conference (01.02.2013)“…Push technology has evolved to a great extent since its inception and there have been many additions of new features to the available solutions, in terms of…”
Get full text
Conference Proceeding -
18
Platform for extending home automation gateway's functionality with plugin mechanism
Published: IEEE 01.09.2015Published in 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (01.09.2015)“… Platform allows those extension modules to be independent from target platform and execute them concurrently in secure and isolated environments…”
Get full text
Conference Proceeding -
19
CAVIUM NETWORKS ADDS JCE SOFTWARE SUPPORT TO SOFTWARE OFFERING
ISSN: 1040-1482Published: Boston Worldwide Videotex 01.08.2005Published in Productivity Software (01.08.2005)“…The NITROX JCE SDK includes Java Cryptographic Extensions (JCE) complying with the industry standard Java Cryptographic Architecture (JCA…”
Get full text
Newsletter Journal Article -
20
Gradian Systems Ltd: Ingrian's Network-Attached Encryption solution secures stored data
Published: Coventry Normans Media Ltd 28.01.2003Published in M2 Presswire (28.01.2003)“… The platform communicates over a secure sockets layer (SSL) connection with JCE (Java Cryptography Extension…”
Get full text
Newsletter

