Search Results - Java security provider

Refine Results
  1. 1

    A model and design of a security provider for Java applications by Abbasi, A.G., Muftic, S., Schmolzer, G.

    ISBN: 1424456479, 9781424456475, 9781424456482, 1424456487
    Published: IEEE 01.11.2009
    “…The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications…”
    Get full text
    Conference Proceeding
  2. 2

    Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL by Juric, Matjaz B., Rozman, Ivan, Brumen, Bostjan, Colnaric, Matjaz, Hericko, Marjan

    ISSN: 0164-1212, 1873-1228
    Published: New York Elsevier Inc 01.05.2006
    Published in The Journal of systems and software (01.05.2006)
    “… The overheads related to the usage of security and the influences of JCE (Java Cryptography Extension…”
    Get full text
    Journal Article
  3. 3

    Some Computer Security Providers Warn of Issues With Oracle's Java -Reuters

    Published: New York Dow Jones & Company Inc 10.01.2013
    Published in Dow Jones Institutional News (10.01.2013)
    Get full text
    Newsletter
  4. 4

    Java JCA/JCE programming in Android with SD smart cards by Maia, L. A., Correia, M. E.

    ISBN: 146732843X, 9781467328432
    ISSN: 2166-0727
    Published: IEEE 01.06.2012
    “…The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone…”
    Get full text
    Conference Proceeding
  5. 5

    Organizing Security Patterns by Hafiz, M., Adamczyk, P., Johnson, R.E.

    ISSN: 0740-7459, 1937-4194
    Published: Los Alamitos, CA IEEE 01.07.2007
    Published in IEEE software (01.07.2007)
    “… However, the old ways of ensuring software systems' security and reliability are inadequate on the Internet…”
    Get full text
    Journal Article
  6. 6

    GemStone Systems Offers Industry's Most Comprehensive Implementation of Enterprise-Class Security in Enterprise Javabeans Application Server by Business Editors, Hi-Tech Writers

    Published: New York Business Wire 08.12.1998
    Published in Business Wire (08.12.1998)
    “…(tm) (JDK) 1.2 security standards and integrates Secured Socket Layer (SSL) technology from Phaos Technology, a leading Java security provider. GemStone/J…”
    Get full text
    Newsletter
  7. 7

    Blockchain-based healthcare management system with two-side verifiability by Tan, Tian Lim, Salam, Iftekhar, Singh, Madhusudan

    ISSN: 1932-6203, 1932-6203
    Published: United States Public Library of Science 14.04.2022
    Published in PloS one (14.04.2022)
    “… A standard solution is outsourcing the electronic health record (EHR) to a cloud service provider (CSP…”
    Get full text
    Journal Article
  8. 8

    Engineering of web services for internet of things applications by Pencheva, Evelina, Atanasov, Ivaylo

    ISSN: 1387-3326, 1572-9419
    Published: New York Springer US 01.04.2016
    Published in Information systems frontiers (01.04.2016)
    “…’ operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party’s database access…”
    Get full text
    Journal Article
  9. 9

    A novel data logging framework to enhance security of Cloud computing by Jain, Jainish Rajesh, Asaduzzaman, Abu

    ISSN: 1558-058X
    Published: IEEE 01.03.2016
    Published in Proceedings of IEEE Southeastcon (01.03.2016)
    “…Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the Cloud…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    Spring Framework Benchmarking Utility for Static Application Security Testing (SAST) Tools by Kuzmina, Elizaveta, Chattha, Shahbaz Pervez, Hosseini, Seyed Ebrahim, Shahbaz, Muazma, Akhunzada, Adnan

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.11.2025
    Published in IEEE internet of things journal (15.11.2025)
    “…Software developers face several challenges when creating or maintaining applications, security assurance is one…”
    Get full text
    Journal Article
  11. 11

    JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures by Nakhaei, Kousha, Ansari, Fateme, Ansari, Ebrahim

    ISSN: 2523-3963, 2523-3971
    Published: Cham Springer International Publishing 01.01.2020
    Published in SN applied sciences (01.01.2020)
    “… However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk…”
    Get full text
    Journal Article
  12. 12

    Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices by Chen, G., Kang, B.-T., Kandemir, M., Vijaykrishnan, N., Irwin, M.J., Chandramouli, R.

    ISSN: 1045-9219, 1558-2183
    Published: New York IEEE 01.09.2004
    “…Java-enabled wireless devices are preferred for various reasons. For example, users can dynamically download Java applications on demand…”
    Get full text
    Journal Article
  13. 13

    A Java cryptography service provider implementing one-time pad by Lindquist, T.E., Diarra, M., Millard, B.R.

    ISBN: 0769520561, 9780769520568
    Published: IEEE 2004
    “…Security is a challenging aspect of communications today that touches many areas including memory space, processing speed, code development and maintenance issues…”
    Get full text
    Conference Proceeding
  14. 14

    PolicyPak Addresses Java Security Concerns

    Published: Amman Disco Digital Media, Inc 08.03.2017
    Published in ICT Monitor Worldwide (08.03.2017)
    “…) solutions for Windows desktops, today introduced its new Java Rules Manager. Once application security settings are defined, PolicyPak Suite of products work with an organization…”
    Get full text
    Newsletter
  15. 15

    Privacy-Aware Web Service Composition and Ranking by Costante, Elisa, Paci, Federica, Zannone, Nicola

    ISSN: 1545-7362, 1546-5004
    Published: Hershey IGI Global 01.07.2013
    “…Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers…”
    Get full text
    Journal Article
  16. 16

    JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers by Xu, Guangquan, Xie, Xiaofei, Huang, Shuhan, Zhang, Jun, Pan, Lei, Lou, Wei, Liang, Kaitai

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.03.2022
    “…To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP…”
    Get full text
    Journal Article
  17. 17

    New metrics to modify BGP routes based on SDN by Elguea, Lorenzo M., Martinez-Rios, Felix

    ISSN: 1022-0038, 1572-8196
    Published: New York Springer US 01.11.2020
    Published in Wireless networks (01.11.2020)
    “…, for example, security…”
    Get full text
    Journal Article
  18. 18

    Perceptions about pasung (physical restraint and confinement) of schizophrenia patients: a qualitative study among family members and other key stakeholders in Bogor Regency, West Java Province, Indonesia 2017 by Laila, Nenden Hikmah, Mahkota, Renti, Krianto, Tri, Shivalli, Siddharudha

    ISSN: 1752-4458, 1752-4458
    Published: London BioMed Central 25.06.2018
    “… . Objective To explore the perceptions of family members of patients of schizophrenia and other key stakeholders concerning pasung in Bogor Regency, West Java Province 2017…”
    Get full text
    Journal Article
  19. 19

    Exploring Web of Things with Embedded Devices by Sarkar, Tanmoy, Das, Niva

    ISSN: 0975-0290, 0975-0282
    Published: Eswar Publications 01.11.2015
    “…In recent years IoT (Internet of Things) is gaining interest among researchers and many IoT development platforms, SDK's have been proposed. There are lots of…”
    Get full text
    Journal Article
  20. 20

    A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards by Ahmed, Khaled A. M., Saraya, Sabry F., Wanis, John F., Ali-Eldin, Amr M. T.

    ISSN: 1999-5903, 1999-5903
    Published: Basel MDPI AG 01.06.2023
    Published in Future internet (01.06.2023)
    “… challenges to balance customer experience, security, and the self-control over personal identity…”
    Get full text
    Journal Article