The Evolution of Java Security

نویسندگان

  • Larry Koved
  • Anthony J. Nadalin
  • Don Neal
  • Tim Lawson
چکیده

This paper provides a high-level overview of the development and evolution of Java security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which Java is being targeted, some of its run-time characteristics, the security features in the current releases of the base technology, the new Java Development Kit (JDK) 1.2 policy-based security model, limitations of stack-based authorization security models, general security requirements, and future directions that Java security might take. IBM initiatives in Java security take into account our customers' desire to deploy Java-based enterprise solutions. Since JDK 1.2 was entering beta test at the time this paper was written, some operational changes and enhancements may result from industry feedback by the time JDK 1.2 becomes generally available.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of the Local Resources Potential to Achieve Food Security in Jombang and Probolinggo Regencies East Java Indonesia

This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...

متن کامل

Supporting Real World Security Models in Java

The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing “Real World” applications. We suggest that in order to support “Real World” security the ability to insert checks into compiled code in a principled way and hi...

متن کامل

Seamless Object Authentication in Different Security Policy Domains

In the trading of intangible goods, there co-exist, from the security policy point of view, several different domains, such as CORBA and Java. In such environment, mobile objects, such as Applet, can move freely between domains, which contributes greatly to the dynamic evolution of the distributed computer system. However, there arises a new security problem: there is no way for the mobile obje...

متن کامل

Object and Access Evolution in Jarrah

Persistent object evolution is at least as important as evolution at the system level since an object may outlive a system in which it is used and may be used in many systems concurrently. The programming language Jarrah is a Java extension supporting secure persistent objects and fine-grained access control to these objects. In this paper we describe the persistence and access control construc...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IBM Systems Journal

دوره 37  شماره 

صفحات  -

تاریخ انتشار 1998