Java brings more functionality and versatility to the world of mobile
devices, but it also introduces new security threats. This book is a
comprehensive presentation of embedded Java security. No other book
specifically addresses the topic of embedded Java security. The main
components of embedded Java are also generally presented to give an idea
about the platform architecture. To assess the effectiveness of the
security model, an evaluation of the security features is carried out
with results presented in the framework of the MEHARI method for risk
analysis, and the Common Criteria methodology of security evaluation.
The usefulness of this security evaluation is to point out areas that
need security hardening. This book provides researchers and
practitioners alike with a broader and deeper understanding of the
issues involved in embedded Java security, and - as a larger view -
mobile devices security.