Chapter 19. Mobile Security for Enterprise
CHAPTER OVERVIEW
Enterprise Security Requirements
Content-Based Security
Device Security
Lightweight Mobile Cryptography Toolkits
Bouncy Castle Lightweight API
The IAIK ME JCE
Phaos Technology Micro Foundation Toolkit
NTRU jNeo for Java Toolkit
B3 Security
Device-Specific APIs
Standardization of J2ME Security APIs
This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today’s Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security ...
Get Enterprise J2ME™: Developing Mobile Java™ Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.