Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
A model and design of a security provider for Java applications
KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
2009 (engelsk)Inngår i: International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009, 5402592- s.Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.

sted, utgiver, år, opplag, sider
2009. 5402592- s.
Emneord [en]
Abstract models, Asymmetric key cryptography, Desktop applications, Encapsulation methods, Enterprise environment, Java applications, Network-security protocols, Security modules, Security protocols, Security requirements, Security services, Symmetric key cryptography, Upper layer, Verification of signature, Abstracting, Cryptography, Internet, Internet protocols, Java programming language, Machine design, Network security
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-152760Scopus ID: 2-s2.0-77950313716ISBN: 978-142445648-2 (tryckt)OAI: oai:DiVA.org:kth-152760DiVA: diva2:751792
Konferanse
International Conference for Internet Technology and Secured Transactions, ICITST 2009, 9 November 2009 through 12 November 2009, London, United Kingdom
Merknad

QC 20141002

Tilgjengelig fra: 2014-10-02 Laget: 2014-10-01 Sist oppdatert: 2014-10-02bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler

Scopus

Søk i DiVA

Av forfatter/redaktør
Muftic, SeadSchmölzer, Gernot
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

Totalt: 424 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf