Embedded Java Security: Security for Mobile Devices
Autor Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhiouaen Limba Engleză Paperback – 18 dec 2006
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.
This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and –as a larger view- mobile devices security.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 325.65 lei 43-57 zile | |
SPRINGER LONDON – 18 dec 2006 | 325.65 lei 43-57 zile | |
SPRINGER LONDON – 13 oct 2010 | 518.73 lei 38-44 zile |
Preț: 325.65 lei
Preț vechi: 407.05 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
62.33€ • 64.96$ • 51.89£
62.33€ • 64.96$ • 51.89£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781846285905
ISBN-10: 1846285909
Pagini: 260
Ilustrații: XIV, 246 p. 38 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.49 kg
Ediția:2007
Editura: SPRINGER LONDON
Colecția Springer
Locul publicării:London, United Kingdom
ISBN-10: 1846285909
Pagini: 260
Ilustrații: XIV, 246 p. 38 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.49 kg
Ediția:2007
Editura: SPRINGER LONDON
Colecția Springer
Locul publicării:London, United Kingdom
Public țintă
Professional/practitionerCuprins
Java ME Platform.- Java ME Virtual Machines.- Connected Limited Device Configuration.- Mobile Information Device Profile.- Java ME-CLDC Security.- Java ME CLDC Security Analysis.- Risk Analysis.- Common Criteria Investigation.- Standards.- Conclusion.
Recenzii
From the reviews:
"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)
"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)
Textul de pe ultima copertă
Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform.
After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations.
Topics and features:
• Presents the security model underlying Java ME
• Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities
• Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework
• Discusses the most prominent standards that are relevant for Java ME security
• Reports on areas of common vulnerabilities, and considers specifications and programming mistakes
• Hints and suggestions are provided as ways for hardening security
This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guidefor self study in the field.
After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations.
Topics and features:
• Presents the security model underlying Java ME
• Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities
• Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework
• Discusses the most prominent standards that are relevant for Java ME security
• Reports on areas of common vulnerabilities, and considers specifications and programming mistakes
• Hints and suggestions are provided as ways for hardening security
This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guidefor self study in the field.
Caracteristici
No other book specifically addresses the topic of embedded Java security Comprehensive presentation of embedded Java security Hints and suggestions are provided as ways for hardening security Prof Debbabi is a well-known authority and expert in mobile computing and embedded devices, especially Java embedded technology