Chapter 19. Mobile Security for Enterprise

CHAPTER OVERVIEW

  • Enterprise Security Requirements

  • Content-Based Security

  • Device Security

  • Lightweight Mobile Cryptography Toolkits

  • Bouncy Castle Lightweight API

  • The IAIK ME JCE

  • Phaos Technology Micro Foundation Toolkit

  • NTRU jNeo for Java Toolkit

  • B3 Security

  • Device-Specific APIs

  • Standardization of J2ME Security APIs

This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today’s Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security ...

Get Enterprise J2ME™: Developing Mobile Java™ Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.