We propose a method for analyzing trade-off between security polices for Java mobile codes and requirements for Java application. We assume that mobile codes are downloaded from different sites, they are used in an application on a site, and their functions are restricted by security polices on the site. We clarify which functions can be performed under the policies on the site using our tool. We also charify which functions are needed so as to meet the requirements for the application by goal oriented requirements analysis(GORA). By comparing functions derived from the policies and functions from the requirments, we can find conflicts between the policies and the requirments, and also find vagueness of the requirements. By using our tool a...
With the large number of mobile applications being developed and used, the mobile application securi...
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a centra...
AbstractPrevention of denial-of-service attacks is indispensable for distributed agent systems to ex...
We propose a method for analyzing trade-off between se-curity policies for Java mobile codes and req...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
SUMMARY We propose a method for analyzing trade-off between an environment where a Java mobile code ...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Users and providers of an information system should clearly understand the threats caused by the sys...
Users and providers of an information system should clearly understand the threats caused by the sys...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
<p>This report describes Android secure coding rules, guidelines, and static analysis that were deve...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
With the large number of mobile applications being developed and used, the mobile application securi...
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a centra...
AbstractPrevention of denial-of-service attacks is indispensable for distributed agent systems to ex...
We propose a method for analyzing trade-off between se-curity policies for Java mobile codes and req...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
SUMMARY We propose a method for analyzing trade-off between an environment where a Java mobile code ...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Users and providers of an information system should clearly understand the threats caused by the sys...
Users and providers of an information system should clearly understand the threats caused by the sys...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
<p>This report describes Android secure coding rules, guidelines, and static analysis that were deve...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
With the large number of mobile applications being developed and used, the mobile application securi...
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a centra...
AbstractPrevention of denial-of-service attacks is indispensable for distributed agent systems to ex...