Security Issues for JME M-Applications
Keywords:
M-applications, JME platform, mobile architecturesAbstract
The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them.References
Java Community Process – JSR-177 - Security and Trust Services API for J2ME, http://jcp.org/en/jsr/detail?id=177
*** – Bouncy Castle Crypto APIs, http://www.bouncycastle.org/
Jonathan KNUDSEN – Wireless Java—Developing with J2ME, Second Edition, APRESS, 2003, ISBN 1-59059-077-5
John MUCHOW – Navigate the file system on a mobile device, 2005, http://www.ibm.com/developerworks/edu/wi-dw-wi-navigate-i.html
Catalin BOJA – Data Security Solution for Mobile Applications, The 9th International Conference on Informatics in Economy IE 2009 - Education, Research & Business Technologies, Bucharest, May 7-8 2009.
Michael Howard, David LeBlanc – Writing Secure Code, Second Edition, Microsoft Press, 2003, ISBN 0-7356-1722-8
Gartner – PC Vendors Eyeing Booming Smartphone Market and Worldwide Mobile Phone Sales Grew 6 Per Cent in 2008, But Sales Declined 5 Per Cent in the Fourth Quarter, www.gartner.com, http://www.gartner.com/it/page.jsp?id=904729
*** – The official Java website, www.sun.java.com
C. Enrique ORTIZ – The Security and Trust Services API for J2ME, Sun Developer Network (SDN), 2005, http://developers.sun.com/mobility/apis/articles/satsa1/
*** – SATSA Developer's Guide, SATSA Reference Implementation 1.0, December 2004, http://java.sun.com/j2me/docs/satsa-dg/
Alfred J. MENEZES, Paul C. van OORSCHOT, Scott A. VANSTONE - Handbook of Applied Cryptography, CRC Press,1997 (http://www.cacr.math.uwaterloo.ca/hac/)
Ion IVAN, Cristian TOMA, Marius POPA, Cătălin BOJA – Secure Architecture for the Digital Rights Management of the M-Content, Proceedings of the WSEAS International Conferences, 5th WSEAS Int. Conf. on Information Security and Privacy, ISP ’06, Venice, Italy, November 20 – 22, 2006, CD ISSN 1790 – 5095, ISSN 1790 – 5117, ISBN 960-8457-56-4.
Michael YUAN, Ju LONG - Securing wireless J2ME, Security challenges and solutions for mobile commerce applications, IBM Technical library, 2002, http://www.ibm.com/developerworks/wireless/library/wi-secj2me.html
Cristian Toma – Security in software distributed platforms, ASE Printing House, Bucharest, 2008, ISBN 978-606-505-125-6.
Victor Valeriu PATRICIU, Ion BICA, Monica Ene-PIETROSEANU, O. PRIESCU – Semnatura electronica si securitatea informatica, Publishing House All, Bucharest, 2005.
*** – The official Bluetooth website, http://www.bluetooth.com
Martin de JODE – Programming Java 2 Micro Edition on Symbian OS, A developer’s guide to MIDP 2.0, Wiley, 2004, ISBN 0-470-09223-8
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The author(s) is responsible for the correctness and legality of the paper content.
- Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.
- It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.
- The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.
JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://jmeds.eu.
Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice.