We discuss how integrity of components of Java applications can be protected. Intrinsic and extrinsic protection mechanisms are employed. Capabilities of the Java application programming interface include permissions and signed JAR files. The strength of the methods depends on the operating system in which the Java virtual machine is embedded. Possible attacks by Trojan horse programs on component integrity are given and an approach to prevent or detect these is presented
Web space is currently inherent in any business activity, from SMEs to international holdings. In th...
ABSTRACT. In Java’s first year it has become clear that many of the problems posed by executable con...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web s...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
The Java(tm) language allows Java-compatible Web browsers to download code fragments dynamically and...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web a...
Deserialization of untrusted data is an issue in many programming languages. In particular, deserial...
Abstract: This paper underlines the importance of security awareness whilst pro-gramming Java applic...
Safe language technology can be used for protection within a single address space. This protection i...
Java is essentially a safe language with good security features. However, there are several Java fea...
This report documents the attempt to raise security for clients against a threat model, with these t...
Web space is currently inherent in any business activity, from SMEs to international holdings. In th...
ABSTRACT. In Java’s first year it has become clear that many of the problems posed by executable con...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web s...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
The Java(tm) language allows Java-compatible Web browsers to download code fragments dynamically and...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web a...
Deserialization of untrusted data is an issue in many programming languages. In particular, deserial...
Abstract: This paper underlines the importance of security awareness whilst pro-gramming Java applic...
Safe language technology can be used for protection within a single address space. This protection i...
Java is essentially a safe language with good security features. However, there are several Java fea...
This report documents the attempt to raise security for clients against a threat model, with these t...
Web space is currently inherent in any business activity, from SMEs to international holdings. In th...
ABSTRACT. In Java’s first year it has become clear that many of the problems posed by executable con...
Abstract. Safe language technology can be used for protection within a single address space. This pr...