Enterprise J2ME Developing Mobile Java Applications [Electronic resources]

Michael Juntao Yuan

نسخه متنی -صفحه : 204/ 171
نمايش فراداده

Chapter 19. Mobile Security for Enterprise

CHAPTER OVERVIEW

Enterprise Security Requirements

Content-Based Security

Device Security

Lightweight Mobile Cryptography Toolkits

Bouncy Castle Lightweight API

The IAIK ME JCE

Phaos Technology Micro Foundation Toolkit

NTRU jNeo for Java Toolkit

B3 Security

Device-Specific APIs

Standardization of J2ME Security APIs

This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today's Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security schemes. In this chapter, we discuss the security requirements of mobile enterprise applications and how third-party J2ME tools can help developers meet those requirements.