Suchergebnisse - Java security provider
-
1
A model and design of a security provider for Java applications
ISBN: 1424456479, 9781424456475, 9781424456482, 1424456487Veröffentlicht: IEEE 01.11.2009Veröffentlicht in ICITST : 2009 International Conference for Internet Technology and Secured Transactions : 9-12 November 2009 (01.11.2009)“… The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications …”
Volltext
Tagungsbericht -
2
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL
ISSN: 0164-1212, 1873-1228Veröffentlicht: New York Elsevier Inc 01.05.2006Veröffentlicht in The Journal of systems and software (01.05.2006)“… The overheads related to the usage of security and the influences of JCE (Java Cryptography Extension …”
Volltext
Journal Article -
3
Some Computer Security Providers Warn of Issues With Oracle's Java -Reuters
Veröffentlicht: New York Dow Jones & Company Inc 10.01.2013Veröffentlicht in Dow Jones Institutional News (10.01.2013)Volltext
Newsletter -
4
Java JCA/JCE programming in Android with SD smart cards
ISBN: 146732843X, 9781467328432ISSN: 2166-0727Veröffentlicht: IEEE 01.06.2012Veröffentlicht in 7th Iberian Conference on Information Systems and Technologies (CISTI 2012) (01.06.2012)“… The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone …”
Volltext
Tagungsbericht -
5
Organizing Security Patterns
ISSN: 0740-7459, 1937-4194Veröffentlicht: Los Alamitos, CA IEEE 01.07.2007Veröffentlicht in IEEE software (01.07.2007)“… However, the old ways of ensuring software systems' security and reliability are inadequate on the Internet …”
Volltext
Journal Article -
6
RESTful Java web services security: secure your RESTful applications against common vulnerabilities
ISBN: 9781783980116, 1783980109, 9781783980109, 1783980117Veröffentlicht: Birmingham PACKT Publishing 2014“… This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use …”
Volltext
E-Book -
7
GemStone Systems Offers Industry's Most Comprehensive Implementation of Enterprise-Class Security in Enterprise Javabeans Application Server
Veröffentlicht: New York Business Wire 08.12.1998Veröffentlicht in Business Wire (08.12.1998)“… (tm) (JDK) 1.2 security standards and integrates Secured Socket Layer (SSL) technology from Phaos Technology, a leading Java security provider. GemStone/J …”
Volltext
Newsletter -
8
Blockchain-based healthcare management system with two-side verifiability
ISSN: 1932-6203, 1932-6203Veröffentlicht: United States Public Library of Science 14.04.2022Veröffentlicht in PloS one (14.04.2022)“… A standard solution is outsourcing the electronic health record (EHR) to a cloud service provider (CSP …”
Volltext
Journal Article -
9
Engineering of web services for internet of things applications
ISSN: 1387-3326, 1572-9419Veröffentlicht: New York Springer US 01.04.2016Veröffentlicht in Information systems frontiers (01.04.2016)“… ’ operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party’s database access …”
Volltext
Journal Article -
10
A novel data logging framework to enhance security of Cloud computing
ISSN: 1558-058XVeröffentlicht: IEEE 01.03.2016Veröffentlicht in Proceedings of IEEE Southeastcon (01.03.2016)“… Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the Cloud …”
Volltext
Tagungsbericht Journal Article -
11
Spring Framework Benchmarking Utility for Static Application Security Testing (SAST) Tools
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 15.11.2025Veröffentlicht in IEEE internet of things journal (15.11.2025)“… Software developers face several challenges when creating or maintaining applications, security assurance is one …”
Volltext
Journal Article -
12
JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures
ISSN: 2523-3963, 2523-3971Veröffentlicht: Cham Springer International Publishing 01.01.2020Veröffentlicht in SN applied sciences (01.01.2020)“… However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk …”
Volltext
Journal Article -
13
Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices
ISSN: 1045-9219, 1558-2183Veröffentlicht: New York IEEE 01.09.2004Veröffentlicht in IEEE transactions on parallel and distributed systems (01.09.2004)“… Java-enabled wireless devices are preferred for various reasons. For example, users can dynamically download Java applications on demand …”
Volltext
Journal Article -
14
A Java cryptography service provider implementing one-time pad
ISBN: 0769520561, 9780769520568Veröffentlicht: IEEE 2004Veröffentlicht in System Sciences: Abstracts of Full Papers, Proceedings 37th International Conference, Hilton Waikoloa Village, Hawaii, 2004 (2004)“… Security is a challenging aspect of communications today that touches many areas including memory space, processing speed, code development and maintenance issues …”
Volltext
Tagungsbericht -
15
PolicyPak Addresses Java Security Concerns
Veröffentlicht: Amman Disco Digital Media, Inc 08.03.2017Veröffentlicht in ICT Monitor Worldwide (08.03.2017)“… ) solutions for Windows desktops, today introduced its new Java Rules Manager. Once application security settings are defined, PolicyPak Suite of products work with an organization …”
Volltext
Newsletter -
16
Privacy-Aware Web Service Composition and Ranking
ISSN: 1545-7362, 1546-5004Veröffentlicht: Hershey IGI Global 01.07.2013Veröffentlicht in International journal of web services research (01.07.2013)“… Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers …”
Volltext
Journal Article -
17
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.03.2022Veröffentlicht in IEEE transactions on dependable and secure computing (01.03.2022)“… To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP …”
Volltext
Journal Article -
18
New metrics to modify BGP routes based on SDN
ISSN: 1022-0038, 1572-8196Veröffentlicht: New York Springer US 01.11.2020Veröffentlicht in Wireless networks (01.11.2020)“… , for example, security …”
Volltext
Journal Article -
19
Perceptions about pasung (physical restraint and confinement) of schizophrenia patients: a qualitative study among family members and other key stakeholders in Bogor Regency, West Java Province, Indonesia 2017
ISSN: 1752-4458, 1752-4458Veröffentlicht: London BioMed Central 25.06.2018Veröffentlicht in International journal of mental health systems (25.06.2018)“… . Objective To explore the perceptions of family members of patients of schizophrenia and other key stakeholders concerning pasung in Bogor Regency, West Java Province 2017 …”
Volltext
Journal Article -
20
Exploring Web of Things with Embedded Devices
ISSN: 0975-0290, 0975-0282Veröffentlicht: Eswar Publications 01.11.2015Veröffentlicht in International journal of advanced networking and applications (01.11.2015)“… In recent years IoT (Internet of Things) is gaining interest among researchers and many IoT development platforms, SDK's have been proposed. There are lots of …”
Volltext
Journal Article

