Web browsers, Web servers, Java application servers all are instances of Java execution environments that run more or less entrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, the application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java applications. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java programming. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java programming for Java applications, applets, servlets, and Enterprise Java Beans. For comparison, the requirements are also catechize for a C++ applications.
Article Details
Unique Paper ID: 142762
Publication Volume & Issue: Volume 2, Issue 6
Page(s): 254 - 256
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT