Treffer: Security issues surrounding the Java<TM> programming language

Title:
Security issues surrounding the Java programming language
Source:
Global IT security (Vienna, Budapest, 31 August - 2 September 1998). :3-14
Publisher Information:
Vienna; Vienna: IFIP, OCG, 1998.
Publication Year:
1998
Physical Description:
print, 17 ref
Original Material:
INIST-CNRS
Document Type:
Konferenz Conference Paper
File Description:
text
Language:
English
Author Affiliations:
Department of Informatics, Technological Educational Institute (T.E.I.) of Athens, Ag.Spiridonos St., Aegaleo, 12243, Greece
Department of Informatics, University ofAthens, TYPA Buildings, Athens 15771, Greece
Department of Information & Communication Systems, Research Unit, University of the Aegean, Samos 83200, Greece
Rights:
Copyright 1999 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems

Telecommunications and information theory
Accession Number:
edscal.1810273
Database:
PASCAL Archive

Weitere Informationen

JAVA is claimed to be a programming language that introduces new methods for platform-independent development and remote execution. However, the ability to download, integrate, and execute code from a remote computer raises serious concerns about JAVA's effect on network security. In this paper, a brief introduction to the JAVA programming language is given, the potential security risks of downloadable executable content is discussed, the details of the proposed JAVA security mechanism are presented, and an evaluation of the current implementations is discussed. Finally, proposed enhancements and upcoming extensions to the security model are described.