Suchergebnisse - Java security provider

  1. 1

    A model and design of a security provider for Java applications von Abbasi, A.G., Muftic, S., Schmolzer, G.

    ISBN: 1424456479, 9781424456475, 9781424456482, 1424456487
    Veröffentlicht: IEEE 01.11.2009
    “… The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications …”
    Volltext
    Tagungsbericht
  2. 2

    Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL von Juric, Matjaz B., Rozman, Ivan, Brumen, Bostjan, Colnaric, Matjaz, Hericko, Marjan

    ISSN: 0164-1212, 1873-1228
    Veröffentlicht: New York Elsevier Inc 01.05.2006
    Veröffentlicht in The Journal of systems and software (01.05.2006)
    “… The overheads related to the usage of security and the influences of JCE (Java Cryptography Extension …”
    Volltext
    Journal Article
  3. 3

    Some Computer Security Providers Warn of Issues With Oracle's Java -Reuters

    Veröffentlicht: New York Dow Jones & Company Inc 10.01.2013
    Veröffentlicht in Dow Jones Institutional News (10.01.2013)
    Volltext
    Newsletter
  4. 4

    Java JCA/JCE programming in Android with SD smart cards von Maia, L. A., Correia, M. E.

    ISBN: 146732843X, 9781467328432
    ISSN: 2166-0727
    Veröffentlicht: IEEE 01.06.2012
    “… The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone …”
    Volltext
    Tagungsbericht
  5. 5

    Organizing Security Patterns von Hafiz, M., Adamczyk, P., Johnson, R.E.

    ISSN: 0740-7459, 1937-4194
    Veröffentlicht: Los Alamitos, CA IEEE 01.07.2007
    Veröffentlicht in IEEE software (01.07.2007)
    “… However, the old ways of ensuring software systems' security and reliability are inadequate on the Internet …”
    Volltext
    Journal Article
  6. 6

    RESTful Java web services security: secure your RESTful applications against common vulnerabilities von Enríquez, René, C., Andrés Salazar

    ISBN: 9781783980116, 1783980109, 9781783980109, 1783980117
    Veröffentlicht: Birmingham PACKT Publishing 2014
    “… This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use …”
    Volltext
    E-Book
  7. 7

    GemStone Systems Offers Industry's Most Comprehensive Implementation of Enterprise-Class Security in Enterprise Javabeans Application Server von Business Editors, Hi-Tech Writers

    Veröffentlicht: New York Business Wire 08.12.1998
    Veröffentlicht in Business Wire (08.12.1998)
    “… (tm) (JDK) 1.2 security standards and integrates Secured Socket Layer (SSL) technology from Phaos Technology, a leading Java security provider. GemStone/J …”
    Volltext
    Newsletter
  8. 8

    Blockchain-based healthcare management system with two-side verifiability von Tan, Tian Lim, Salam, Iftekhar, Singh, Madhusudan

    ISSN: 1932-6203, 1932-6203
    Veröffentlicht: United States Public Library of Science 14.04.2022
    Veröffentlicht in PloS one (14.04.2022)
    “… A standard solution is outsourcing the electronic health record (EHR) to a cloud service provider (CSP …”
    Volltext
    Journal Article
  9. 9

    Engineering of web services for internet of things applications von Pencheva, Evelina, Atanasov, Ivaylo

    ISSN: 1387-3326, 1572-9419
    Veröffentlicht: New York Springer US 01.04.2016
    Veröffentlicht in Information systems frontiers (01.04.2016)
    “… ’ operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party’s database access …”
    Volltext
    Journal Article
  10. 10

    A novel data logging framework to enhance security of Cloud computing von Jain, Jainish Rajesh, Asaduzzaman, Abu

    ISSN: 1558-058X
    Veröffentlicht: IEEE 01.03.2016
    Veröffentlicht in Proceedings of IEEE Southeastcon (01.03.2016)
    “… Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the Cloud …”
    Volltext
    Tagungsbericht Journal Article
  11. 11

    Spring Framework Benchmarking Utility for Static Application Security Testing (SAST) Tools von Kuzmina, Elizaveta, Chattha, Shahbaz Pervez, Hosseini, Seyed Ebrahim, Shahbaz, Muazma, Akhunzada, Adnan

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 15.11.2025
    Veröffentlicht in IEEE internet of things journal (15.11.2025)
    “… Software developers face several challenges when creating or maintaining applications, security assurance is one …”
    Volltext
    Journal Article
  12. 12

    JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures von Nakhaei, Kousha, Ansari, Fateme, Ansari, Ebrahim

    ISSN: 2523-3963, 2523-3971
    Veröffentlicht: Cham Springer International Publishing 01.01.2020
    Veröffentlicht in SN applied sciences (01.01.2020)
    “… However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk …”
    Volltext
    Journal Article
  13. 13

    Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices von Chen, G., Kang, B.-T., Kandemir, M., Vijaykrishnan, N., Irwin, M.J., Chandramouli, R.

    ISSN: 1045-9219, 1558-2183
    Veröffentlicht: New York IEEE 01.09.2004
    “… Java-enabled wireless devices are preferred for various reasons. For example, users can dynamically download Java applications on demand …”
    Volltext
    Journal Article
  14. 14

    A Java cryptography service provider implementing one-time pad von Lindquist, T.E., Diarra, M., Millard, B.R.

    ISBN: 0769520561, 9780769520568
    Veröffentlicht: IEEE 2004
    “… Security is a challenging aspect of communications today that touches many areas including memory space, processing speed, code development and maintenance issues …”
    Volltext
    Tagungsbericht
  15. 15

    PolicyPak Addresses Java Security Concerns

    Veröffentlicht: Amman Disco Digital Media, Inc 08.03.2017
    Veröffentlicht in ICT Monitor Worldwide (08.03.2017)
    “… ) solutions for Windows desktops, today introduced its new Java Rules Manager. Once application security settings are defined, PolicyPak Suite of products work with an organization …”
    Volltext
    Newsletter
  16. 16

    Privacy-Aware Web Service Composition and Ranking von Costante, Elisa, Paci, Federica, Zannone, Nicola

    ISSN: 1545-7362, 1546-5004
    Veröffentlicht: Hershey IGI Global 01.07.2013
    Veröffentlicht in International journal of web services research (01.07.2013)
    “… Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers …”
    Volltext
    Journal Article
  17. 17

    JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers von Xu, Guangquan, Xie, Xiaofei, Huang, Shuhan, Zhang, Jun, Pan, Lei, Lou, Wei, Liang, Kaitai

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.03.2022
    “… To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP …”
    Volltext
    Journal Article
  18. 18

    New metrics to modify BGP routes based on SDN von Elguea, Lorenzo M., Martinez-Rios, Felix

    ISSN: 1022-0038, 1572-8196
    Veröffentlicht: New York Springer US 01.11.2020
    Veröffentlicht in Wireless networks (01.11.2020)
    “… , for example, security …”
    Volltext
    Journal Article
  19. 19

    Perceptions about pasung (physical restraint and confinement) of schizophrenia patients: a qualitative study among family members and other key stakeholders in Bogor Regency, West Java Province, Indonesia 2017 von Laila, Nenden Hikmah, Mahkota, Renti, Krianto, Tri, Shivalli, Siddharudha

    ISSN: 1752-4458, 1752-4458
    Veröffentlicht: London BioMed Central 25.06.2018
    Veröffentlicht in International journal of mental health systems (25.06.2018)
    “… . Objective To explore the perceptions of family members of patients of schizophrenia and other key stakeholders concerning pasung in Bogor Regency, West Java Province 2017 …”
    Volltext
    Journal Article
  20. 20

    Exploring Web of Things with Embedded Devices von Sarkar, Tanmoy, Das, Niva

    ISSN: 0975-0290, 0975-0282
    Veröffentlicht: Eswar Publications 01.11.2015
    “… In recent years IoT (Internet of Things) is gaining interest among researchers and many IoT development platforms, SDK's have been proposed. There are lots of …”
    Volltext
    Journal Article