Expanding and extending the security features of Java']Java

被引:0
|
作者
Mehta, NV [1 ]
机构
[1] OpenGrp, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population becomes more broad-based. Coupling these with the increased security threats posed by importing more and more mobile code has caused an emphasis on the security of executing Java applets. This paper considers two significant enhancements that will provide users with both a richer and more effective security model. The two enhancements are the provision of flexible and configurable security constraints and the ability to confine use of certain storage channels, as defined by Lampson[11], to within those constraints. We are particularly concerned with applets using files as communications channels contrary to desired security constraints. We present the mechanisms, a discussion of the implementation, and a summary of some performance comparisons. It is important to note that the ideas presented here are more generally applicable than only to the particular storage channels discussed or even only to Java.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [1] On extending Java']Java
    Krall, A
    Vitek, J
    [J]. MODULAR PROGRAMMING LANGUAGES, 1997, 1204 : 321 - 335
  • [2] Java']Java security
    Boukanov, I
    [J]. DR DOBBS JOURNAL, 1997, 22 (09): : 10 - 10
  • [3] Java']Java security
    Foote, B
    [J]. IEEE SPECTRUM, 1999, 36 (10) : 6 - +
  • [4] Extending the deployment of Java']Java platform
    不详
    [J]. CONTROL AND INSTRUMENTATION, 1999, 31 (02): : 23 - 23
  • [5] Extending FeatherTrait Java']Java with Interfaces
    Liquori, Luigi
    Spiwack, Arnaud
    [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 243 - 260
  • [6] The evolution of Java']Java security
    Koved, L
    Nadalin, AJ
    Neal, D
    Lawson, T
    [J]. IBM SYSTEMS JOURNAL, 1998, 37 (03) : 349 - 364
  • [7] Extending operational semantics of the Java']Java bytecode
    Czarnik, Patryk
    Schubert, Aleksy
    [J]. TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 57 - 72
  • [8] Java']Java security extensions for a Java']Java server in a hostile environment
    Wheeler, DM
    Conyers, A
    Luo, J
    Xiong, A
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 64 - 73
  • [9] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices
    Ion, Iulia
    Dragovic, Boris
    Crispo, Bruno
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
  • [10] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69