Skip to main content

Embedded Java Security

Security for Mobile Devices

  • Book
  • © 2007

Overview

  • No other book specifically addresses the topic of embedded Java security
  • Comprehensive presentation of embedded Java security
  • Hints and suggestions are provided as ways for hardening security
  • Prof Debbabi is a well-known authority and expert in mobile computing and embedded devices, especially Java embedded technology

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (10 chapters)

Keywords

About this book

Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.

This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and –as a larger view- mobile devices security.

Reviews

From the reviews:

"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)

Authors and Affiliations

  • Computer Security Laboratory, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada

    Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua

Bibliographic Information

Publish with us