SUMMARY We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible re-quirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the dif-ferences between customers ’ goals and realizable solutions. Cus-tomers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functio...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This dissertation presents a novel security architecture called security-passing style and motivates...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
We propose a method for analyzing trade-off between security polices for Java mobile codes and requi...
Users and providers of an information system should clearly understand the threats caused by the sys...
Users and providers of an information system should clearly understand the threats caused by the sys...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
<p>This report describes Android secure coding rules, guidelines, and static analysis that were deve...
With the large number of mobile applications being developed and used, the mobile application securi...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This dissertation presents a novel security architecture called security-passing style and motivates...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
We propose a method for analyzing trade-off between security polices for Java mobile codes and requi...
Users and providers of an information system should clearly understand the threats caused by the sys...
Users and providers of an information system should clearly understand the threats caused by the sys...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
<p>This report describes Android secure coding rules, guidelines, and static analysis that were deve...
With the large number of mobile applications being developed and used, the mobile application securi...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
This dissertation presents a novel security architecture called security-passing style and motivates...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...