Securing Your Applications

  • Carol Hamer


In this chapter you’ll see how to use the security features of the Mobile Information Device Profile (MIDP) to secure your games. You’ll improve both of the games from the previous chapter by using secure connections to transmit the game data. You’ll also learn about other aspects of the MIDP security system such as permissions and protection domains.


Virtual Machine Certificate Authority Uniform Resource Locator Digital Certificate Secure Connection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Carol Hamer 2004

Authors and Affiliations

  • Carol Hamer

There are no affiliations available

Personalised recommendations