Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Physical Sciences and Mathematics
Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong
Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong
Leisa Armstrong
Following Moore's law, the numbers of mobile phones and their capabifities have increased exponentially in recent years. The platform of choice for running applications on resource constrained devices such as mobile phones, today, is the Java 2 Micro Edition (J2ME) with Connected Limited Device Configuration (CLDC). This popularity exposes the security risks. These risks include the loss of data, money and privacy. Means of securing mobile phones and communication have been weI! researched and models have been proposed, based on their success on desktop computers. However, little has been done to explore and correct inherent flaws and possible vulnerabilities in …