Embedded Java Security - Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua

Embedded Java Security

Security for Mobile Devices
Buch | Softcover
246 Seiten
2010 | Softcover reprint of hardcover 1st ed. 2007
Springer London Ltd (Verlag)
978-1-84996-623-8 (ISBN)
93,08 inkl. MwSt
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.

This book is a comprehensive presentation of embedded Java security.
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.


This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.


This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and –as a larger view- mobile devices security.

Java ME Platform.- Java ME Virtual Machines.- Connected Limited Device Configuration.- Mobile Information Device Profile.- Java ME-CLDC Security.- Java ME CLDC Security Analysis.- Risk Analysis.- Common Criteria Investigation.- Standards.- Conclusion.

Zusatzinfo 38 Illustrations, black and white; XIV, 246 p. 38 illus.
Verlagsort England
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Programmiersprachen / -werkzeuge Java
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
ISBN-10 1-84996-623-0 / 1849966230
ISBN-13 978-1-84996-623-8 / 9781849966238
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
94,95