J2ME application-layer end-to-end security for m-commerce
نویسندگان
چکیده
This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality and integrity between wireless J2ME based-clients and J2EE based-servers. This solution can be implemented with the available limited resources of a Java MIDP device, without any modification to the underlying protocols or wireless network infrastructure. A mobile banking application is used to illustrate the implementation of the proposed solution.
منابع مشابه
A Security Tunnel for Conducting Mobile Business over the Tcp Protocol
This paper discusses security issues in the Mobile Business area with emphasis on the significance of mobile commerce and provides a framework to address and analyse common security problems of mBusiness services and applications. We propose a new model to address efficiently some security problems in mobile environments, which rescinds Gateway/Proxy intermediates and establishes a secure end-t...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملSecure Business Application Logic for e-Commerce Systems
The major reason why most people are still sceptical about e-commerce is the perceived security and privacy risks associated with e-transactions, e.g., data, smart cards, credit cards and exchange of business information by means of online transactions. Today, vendors of e-commerce systems have relied solely on secure transaction protocols such as SSL, while ignoring the security of server and ...
متن کاملSPARTA: a Secure, Policy-Driven Architecture for Content Distribution and Storage in Centralized Wireless Networks
This paper presents SPARTA (Secure, Policy-driven, ARchitecture for content disTribution and storAge), a secure, policy-driven architecture for enterprise applications operating in centralized wireless environments. SPARTA supports end-to-end client authentication, data integrity and confidentiality. The security services provided by SPARTA are customized and controlled by easily configurable s...
متن کاملAre E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 27 شماره
صفحات -
تاریخ انتشار 2004