Chapter 19. Mobile Security for EnterpriseCHAPTER OVERVIEW Enterprise Security Requirements Content-Based Security Device Security Lightweight Mobile Cryptography Toolkits Bouncy Castle Lightweight API The IAIK ME JCE Phaos Technology Micro Foundation Toolkit NTRU jNeo for Java Toolkit B3 Security Device-Specific APIs Standardization of J2ME Security APIs
This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today's Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security schemes. In this chapter, we discuss the security requirements of mobile enterprise applications and how third-party J2ME tools can help developers meet those requirements. |