Skip to main content

Conclusion

  • Chapter
Embedded Java Security
  • 715 Accesses

Abstract

With the advent and rising popularity of wireless and mobile systems, there is a proliferation of internet-enabled devices (PDAs, cell phones, set-top boxes, pagers, etc.). In this context, Java is emerging as a standard execution environment due to its security, portability, mobility and network support features. The platform of choice in this setting is Java ME CLDC (Java 2 Micro-Edition for Connected Limited Device Configuration). It is used to provide a plethora of services and applications: Web-services, games, messaging, presence and availability, mobile commerce, etc. This platform has been deployed now by the majority of the telecommunication operators. The total number of deployed Java handsets in the market is in the range of a billion units. Java ME CLDC gained a big momentum and is now standardized by the Java Community Process (JCP) and adopted by many standardization bodies. Another factor that has amplified the wide industrial adoption of Java ME is the broad range of Java-based solutions that are available in the market. All these factors made Java in general and Java ME in particular an ideal solution for software development in the arena of embedded and wireless systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag London Limited

About this chapter

Cite this chapter

(2007). Conclusion. In: Embedded Java Security. Springer, London. https://doi.org/10.1007/978-1-84628-711-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-711-4_10

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-590-5

  • Online ISBN: 978-1-84628-711-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics