Security Issues for JME M-Applications

Authors

  • Catalin Boja Bucharest Academy of Economic Studies, Romania

Keywords:

M-applications, JME platform, mobile architectures

Abstract

The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them.

Author Biography

Catalin Boja, Bucharest Academy of Economic Studies, Romania

Faculty of Cybernetics, Statistics and Economic Informatics

Department of IT&C Technologies

References

Java Community Process – JSR-177 - Security and Trust Services API for J2ME, http://jcp.org/en/jsr/detail?id=177

*** – Bouncy Castle Crypto APIs, http://www.bouncycastle.org/

Jonathan KNUDSEN – Wireless Java—Developing with J2ME, Second Edition, APRESS, 2003, ISBN 1-59059-077-5

John MUCHOW – Navigate the file system on a mobile device, 2005, http://www.ibm.com/developerworks/edu/wi-dw-wi-navigate-i.html

Catalin BOJA – Data Security Solution for Mobile Applications, The 9th International Conference on Informatics in Economy IE 2009 - Education, Research & Business Technologies, Bucharest, May 7-8 2009.

Michael Howard, David LeBlanc – Writing Secure Code, Second Edition, Microsoft Press, 2003, ISBN 0-7356-1722-8

Gartner – PC Vendors Eyeing Booming Smartphone Market and Worldwide Mobile Phone Sales Grew 6 Per Cent in 2008, But Sales Declined 5 Per Cent in the Fourth Quarter, www.gartner.com, http://www.gartner.com/it/page.jsp?id=904729

*** – The official Java website, www.sun.java.com

C. Enrique ORTIZ – The Security and Trust Services API for J2ME, Sun Developer Network (SDN), 2005, http://developers.sun.com/mobility/apis/articles/satsa1/

*** – SATSA Developer's Guide, SATSA Reference Implementation 1.0, December 2004, http://java.sun.com/j2me/docs/satsa-dg/

Alfred J. MENEZES, Paul C. van OORSCHOT, Scott A. VANSTONE - Handbook of Applied Cryptography, CRC Press,1997 (http://www.cacr.math.uwaterloo.ca/hac/)

Ion IVAN, Cristian TOMA, Marius POPA, Cătălin BOJA – Secure Architecture for the Digital Rights Management of the M-Content, Proceedings of the WSEAS International Conferences, 5th WSEAS Int. Conf. on Information Security and Privacy, ISP ’06, Venice, Italy, November 20 – 22, 2006, CD ISSN 1790 – 5095, ISSN 1790 – 5117, ISBN 960-8457-56-4.

Michael YUAN, Ju LONG - Securing wireless J2ME, Security challenges and solutions for mobile commerce applications, IBM Technical library, 2002, http://www.ibm.com/developerworks/wireless/library/wi-secj2me.html

Cristian Toma – Security in software distributed platforms, ASE Printing House, Bucharest, 2008, ISBN 978-606-505-125-6.

Victor Valeriu PATRICIU, Ion BICA, Monica Ene-PIETROSEANU, O. PRIESCU – Semnatura electronica si securitatea informatica, Publishing House All, Bucharest, 2005.

*** – The official Bluetooth website, http://www.bluetooth.com

Martin de JODE – Programming Java 2 Micro Edition on Symbian OS, A developer’s guide to MIDP 2.0, Wiley, 2004, ISBN 0-470-09223-8

Downloads

Published

2009-06-30

How to Cite

Boja, C. (2009). Security Issues for JME M-Applications. Journal of Mobile, Embedded and Distributed Systems, 1(1), 43-49. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-JME-M-Applications