This paper elucidates the research and implementation of Microlog in J2ME applications. This small yet powerful logging library logs all the detailed background transactions, acts as a tool for detecting unauthorized users trying to access the application by logging to remote servers and devices via various logging destinations. It also retrieves useful runtime information, such as malfunction code and unexpected errors and behaviours. The log thus generated can be printed using a portable Bluetooth printer. J2ME being platform independent works with Microlog in providing a great feature being explored by future J2ME developers. © Springer-Verlag Berlin Heidelberg 2011.
CITATION STYLE
Gupta, S., & Singh, S. K. (2011). Authenticating and securing mobile applications using microlog. In Communications in Computer and Information Science (Vol. 133 CCIS, pp. 258–267). https://doi.org/10.1007/978-3-642-17881-8_25
Mendeley helps you to discover research relevant for your work.