Search Results - Java Secure Sockets Extension

Refine Results
  1. 1

    Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API by Wijayarathna, Chamila, Arachchilage, Nalin Asanka Gamagedara

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.01.2019
    Published in Computers & security (01.01.2019)
    “… In this work, we evaluated the usability of Java Secure Socket Extension (JSSE) API to identify usability issues in it that persuade programmers to make mistakes while developing applications that would result in security vulnerabilities…”
    Get full text
    Journal Article
  2. 2

    The Java secure socket extensions: Authenticating and encrypting connections by Angell, Kirby W

    ISSN: 1044-789X
    Published: San Mateo Informa 01.02.2001
    Published in Dr. Dobb's Journal (01.02.2001)
    “… Angell discusses Java Secure Socket Extensions (JSSE) and the Java Run-Time Environment (JRE)…”
    Get full text
    Magazine Article Trade Publication Article
  3. 3

    Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project by Jürjens, Jan

    ISSN: 1571-0661, 1571-0661
    Published: Elsevier B.V 01.09.2009
    “… We also shortly comment on how these results can be transferred to the standard Java Secure Sockets Extension (JSSE) library that was recently open-sourced by Sun…”
    Get full text
    Journal Article
  4. 4

    Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation by Wijayarathna, Chamila, Arachchilage, Nalin Asanka Gamagedara

    ISSN: 0950-5849, 1873-6025
    Published: Elsevier B.V 01.11.2019
    Published in Information and software technology (01.11.2019)
    “…•This research evaluates the Cognitive Dimensions Framework based Usability Evaluation Methodology for security APIs by measuring its thoroughness, validity,…”
    Get full text
    Journal Article
  5. 5

    Session-based adaptive overload control for secure dynamic Web applications by Guitart, J., Carrera, D., Beltran, V., Torres, J., Ayguade, E.

    ISBN: 9780769523804, 0769523803
    ISSN: 0190-3918
    Published: IEEE 2005
    “… In this paper we present a session-based adaptive overload control mechanism based on SSL (secure socket layer) connections differentiation and admission control…”
    Get full text
    Conference Proceeding
  6. 6

    Runtime verification of cryptographic protocols by Bauer, Andreas, Jürjens, Jan

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.05.2010
    Published in Computers & security (01.05.2010)
    “…There has been a significant amount of work devoted to the static verification of security protocol designs. Virtually all of these results, when applied to an…”
    Get full text
    Journal Article
  7. 7

    Tracking down software bugs using automatic anomaly detection by Hangal, Sudheendra, Lam, Monica S.

    ISBN: 158113472X, 9781581134728
    ISSN: 0270-5257
    Published: New York, NY, USA ACM 01.01.2002
    “…This paper introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and identifying their root causes. By…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Android security internals : an in-depth guide to Android's security architecture by Elenkov, Nikolay

    ISBN: 1593275811, 9781593275815, 9781593276416, 1593276419
    Published: San Francisco No Starch Press 2014
    “… application packages and employs code signing to verify their authenticityHow Android implements the Java…”
    Get full text
    eBook Book
  9. 9

    A secure encrypted Web platform based on RBAC heirarchical key graph by Sharma, Sushil Kumar

    ISBN: 9780493299228, 049329922X
    Published: ProQuest Dissertations & Theses 01.01.2001
    “… The userID/password pair or Digital Certificate is used for initial client authentication. The client/server run secure socket layer (SSL) link…”
    Get full text
    Dissertation
  10. 10

    Sun Microsystems: Sun Microsystems sets the standard for security in the manufacturing industry; Highly secure Solaris platform, Sun ONE software and Java technology-based applications meet manufacturers' needs in today's networked world

    Published: Coventry Normans Media Ltd 03.03.2003
    Published in M2 Presswire (03.03.2003)
    “…), Java Secure Socket Extension (JSSE), and Java Authentication and Authorization Service (JAAS…”
    Get full text
    Newsletter
  11. 11

    WebSOS: an overlay-based system for protecting web servers from denial of service attacks by Stavrou, Angelos, Cook, Debra L., Morein, William G., Keromytis, Angelos D., Misra, Vishal, Rubenstein, Dan

    ISSN: 1389-1286, 1872-7069
    Published: Amsterdam Elsevier B.V 05.08.2005
    “…We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our…”
    Get full text
    Journal Article
  12. 12

    Cavium Networks Accelerates Security for Web Services XML With new Java(TM) Software Development Kit

    Published: New York PR Newswire Association LLC 20.06.2005
    Published in PR Newswire (20.06.2005)
    “… For more information, please visit: http://www.caviumnetworks.com Applications such as JSSE (Java Secure Socket Extensions…”
    Get full text
    Newsletter
  13. 13

    Tracking down software bugs using automatic anomaly detection by Hangal, S., Lam, M.S.

    ISBN: 158113472X, 9781581134728
    Published: IEEE 2002
    “…Introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and identifying their root causes. By instrumenting…”
    Get full text
    Conference Proceeding
  14. 14

    Java Tip 96: Use HTTPS in your Java client code; Find out how to use the HTTPS protocol with the standard URL class by Towers, Matt

    ISSN: 1091-8906, 1091-8906
    Published: San Francisco Foundry 16.06.2000
    Published in Java world (16.06.2000)
    “…f you've ever tried to implement secure communication between a Java client and an HTTPS…”
    Get full text
    Magazine Article
  15. 15

    Conceptual design of Remote Control System for EAST tokamak by Sun, X.Y., Wang, F., Wang, Y., Li, S.

    ISSN: 0920-3796, 1873-7196
    Published: Elsevier B.V 01.05.2014
    Published in Fusion engineering and design (01.05.2014)
    “… The Remote Control System (RCS), as an extension of the Central Control System for the EAST tokamak, is designed to provide an efficient and economical way to international collaboration…”
    Get full text
    Journal Article
  16. 16

    Sun Microsystems: Sun Microsystems releases the newest version of the Java 2 Platform, Standard Edition; J2SE 1.4 lays the foundation for next-generation web applications and services

    Published: Coventry Normans Media Ltd 30.05.2001
    Published in M2 Presswire (30.05.2001)
    “…M2 PRESSWIRE-30 May 2001-Sun Microsystems: Sun Microsystems releases the newest version of the Java 2 Platform, Standard Edition; J2SE…”
    Get full text
    Newsletter
  17. 17

    PushNotify: Push server application by Danish, M., Parwekar, P.

    ISBN: 9781467345279, 146734527X
    Published: IEEE 01.02.2013
    “…Push technology has evolved to a great extent since its inception and there have been many additions of new features to the available solutions, in terms of…”
    Get full text
    Conference Proceeding
  18. 18

    Platform for extending home automation gateway's functionality with plugin mechanism by Pandurov, Milan, Petelj, Boris, Pavlovic, Roman, Teslic, Nikola

    Published: IEEE 01.09.2015
    “… Platform allows those extension modules to be independent from target platform and execute them concurrently in secure and isolated environments…”
    Get full text
    Conference Proceeding
  19. 19

    CAVIUM NETWORKS ADDS JCE SOFTWARE SUPPORT TO SOFTWARE OFFERING

    ISSN: 1040-1482
    Published: Boston Worldwide Videotex 01.08.2005
    Published in Productivity Software (01.08.2005)
    “…The NITROX JCE SDK includes Java Cryptographic Extensions (JCE) complying with the industry standard Java Cryptographic Architecture (JCA…”
    Get full text
    Newsletter Journal Article
  20. 20

    Gradian Systems Ltd: Ingrian's Network-Attached Encryption solution secures stored data

    Published: Coventry Normans Media Ltd 28.01.2003
    Published in M2 Presswire (28.01.2003)
    “… The platform communicates over a secure sockets layer (SSL) connection with JCE (Java Cryptography Extension…”
    Get full text
    Newsletter