Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A model and design of a security provider for Java applications
KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Communication Systems, CoS (closed 2012-01-01).
2009 (English)In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009, 5402592- p.Conference paper, Published paper (Refereed)
Abstract [en]

The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.

Place, publisher, year, edition, pages
2009. 5402592- p.
Keyword [en]
Abstract models, Asymmetric key cryptography, Desktop applications, Encapsulation methods, Enterprise environment, Java applications, Network-security protocols, Security modules, Security protocols, Security requirements, Security services, Symmetric key cryptography, Upper layer, Verification of signature, Abstracting, Cryptography, Internet, Internet protocols, Java programming language, Machine design, Network security
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-152760Scopus ID: 2-s2.0-77950313716ISBN: 978-142445648-2 (print)OAI: oai:DiVA.org:kth-152760DiVA: diva2:751792
Conference
International Conference for Internet Technology and Secured Transactions, ICITST 2009, 9 November 2009 through 12 November 2009, London, United Kingdom
Note

QC 20141002

Available from: 2014-10-02 Created: 2014-10-01 Last updated: 2014-10-02Bibliographically approved

Open Access in DiVA

No full text

Scopus

Search in DiVA

By author/editor
Muftic, SeadSchmölzer, Gernot
By organisation
Communication Systems, CoS (closed 2012-01-01)
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 425 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf