O'Reilly logo

Enterprise J2ME™: Developing Mobile Java™ Applications by Michael Juntao Yuan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19. Mobile Security for Enterprise

CHAPTER OVERVIEW

  • Enterprise Security Requirements

  • Content-Based Security

  • Device Security

  • Lightweight Mobile Cryptography Toolkits

  • Bouncy Castle Lightweight API

  • The IAIK ME JCE

  • Phaos Technology Micro Foundation Toolkit

  • NTRU jNeo for Java Toolkit

  • B3 Security

  • Device-Specific APIs

  • Standardization of J2ME Security APIs

This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today’s Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required