java security

  • Unique Paper ID: 142762
  • Volume: 2
  • Issue: 6
  • PageNo: 254-256
  • Abstract:
  • Web browsers, Web servers, Java application servers all are instances of Java execution environments that run more or less entrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, the application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java applications. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java programming. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java programming for Java applications, applets, servlets, and Enterprise Java Beans. For comparison, the requirements are also catechize for a C++ applications.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{142762,
        author = {Ritu Yadav},
        title = {java security},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {2},
        number = {6},
        pages = {254-256},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=142762},
        abstract = {Web browsers, Web servers, Java application servers all are instances of Java execution environments that run more or less entrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, the application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java applications. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java programming. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java programming for Java applications, applets, servlets, and Enterprise Java Beans. For comparison, the requirements are also catechize for a C++ applications.},
        keywords = {Java , Security , Applications},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 6
  • PageNo: 254-256

java security

Related Articles