Expanding and extending the security features of Java']Java

被引:0
|
作者
Mehta, NV [1 ]
机构
[1] OpenGrp, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population becomes more broad-based. Coupling these with the increased security threats posed by importing more and more mobile code has caused an emphasis on the security of executing Java applets. This paper considers two significant enhancements that will provide users with both a richer and more effective security model. The two enhancements are the provision of flexible and configurable security constraints and the ability to confine use of certain storage channels, as defined by Lampson[11], to within those constraints. We are particularly concerned with applets using files as communications channels contrary to desired security constraints. We present the mechanisms, a discussion of the implementation, and a summary of some performance comparisons. It is important to note that the ideas presented here are more generally applicable than only to the particular storage channels discussed or even only to Java.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 50 条
  • [21] Security Enhanced Java']Java: Mandatory Access Control for the Java']Java Virtual Machine
    Venelle, Benjamin
    Briffaut, Jeremy
    Clevy, Laurent
    Toinard, Christian
    [J]. 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC), 2013,
  • [22] Developing a security Typed Java']Java Servlet
    Hassan, Doaa
    El-Kassas, Sherif
    Ziedan, Ibrabim
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 215 - 220
  • [23] A security infrastructure for distributed Java']Java applications
    Balfanz, D
    Dean, D
    Spreitzer, M
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 15 - 26
  • [24] Java']Java Security: A Ten Year Retrospective
    Gong, Li
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 395 - 399
  • [25] Java']Java for mobile devices: A security study
    Debbabi, M
    Saleh, M
    Talhi, C
    Zhioua, S
    [J]. 21st Annual Computer Security Applications Conference, Proceedings, 2005, : 210 - 219
  • [26] A security framework for reflective Java']Java applications
    Caromel, D
    Vayssière, J
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (09): : 821 - 846
  • [27] SECURITY MONITORS FOR JAVA']JAVA PROGRAMS WITH MPL
    Leppanen, Ville
    Makela, Jari-Matti
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (01): : 35 - 50
  • [28] JAVA']JAVA SECURITY: PRESENT AND NEAR FUTURE
    Gong, Li
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 400 - 405
  • [29] New security architectural directions for Java']Java
    Li, G
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 97 - 102
  • [30] Java']Java security: Present and near future
    Gong, L
    [J]. IEEE MICRO, 1997, 17 (03) : 14 - 19