Web browsers, Web servers, Java application servers all are instances of Java execution environments that run more or less entrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, the application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java applications. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java programming. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java programming for Java applications, applets, servlets, and Enterprise Java Beans. For comparison, the requirements are also catechize for a C++ applications.
Article Details
Unique Paper ID: 142762
Publication Volume & Issue: Volume 2, Issue 6
Page(s): 254 - 256
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024