• ISSN: 2349-6002
  • UGC Approved Journal No 47859

java security

  • Unique Paper ID: 142762
  • Volume: 2
  • Issue: 6
  • PageNo: 254-256
  • Abstract:
  • Web browsers, Web servers, Java application servers all are instances of Java execution environments that run more or less entrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, the application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java applications. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java programming. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java programming for Java applications, applets, servlets, and Enterprise Java Beans. For comparison, the requirements are also catechize for a C++ applications.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 6
  • PageNo: 254-256

java security

Related Articles