Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
A model and design of a security provider for Java applications
KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
2009 (Engelska)Ingår i: International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009, 5402592- s.Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.

Ort, förlag, år, upplaga, sidor
2009. 5402592- s.
Nyckelord [en]
Abstract models, Asymmetric key cryptography, Desktop applications, Encapsulation methods, Enterprise environment, Java applications, Network-security protocols, Security modules, Security protocols, Security requirements, Security services, Symmetric key cryptography, Upper layer, Verification of signature, Abstracting, Cryptography, Internet, Internet protocols, Java programming language, Machine design, Network security
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
URN: urn:nbn:se:kth:diva-152760Scopus ID: 2-s2.0-77950313716ISBN: 978-142445648-2 (tryckt)OAI: oai:DiVA.org:kth-152760DiVA: diva2:751792
Konferens
International Conference for Internet Technology and Secured Transactions, ICITST 2009, 9 November 2009 through 12 November 2009, London, United Kingdom
Anmärkning

QC 20141002

Tillgänglig från: 2014-10-02 Skapad: 2014-10-01 Senast uppdaterad: 2014-10-02Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas

Scopus

Sök vidare i DiVA

Av författaren/redaktören
Muftic, SeadSchmölzer, Gernot
Av organisationen
Kommunikationssystem, CoS (stängd 2012-01-01)
Kommunikationssystem

Sök vidare utanför DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 425 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf