Title
Java Solutions for Securing Edge-to-Enterprise Systems
Description
The development of new edge-to-enterprise systems brings exciting new opportunities, but it also introduces the security conundrum of how to ensure against attack and intrusion while maintaining flexibility, over-the-air programmability, and reduced costs.
This presentation discusses how Java, the #1 embedded software security solution, is ideally placed to address this conundrum by providing the foundations of a trusted system. Ranging in scale from the smallest-footprint devices such as secure cards to the largest enterprise systems, Java delivers a secure and trusted execution environment through key elements such as identification, validation, key management, and encryption, as you'll learn in this session.
Copyright © 2013 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement.
There are no comments.
Login to respond »