An evaluation of Java']Java application containers according to security requirements

被引:6
作者
Herzog, A [1 ]
Shahmehri, N [1 ]
机构
[1] Linkoping Univ, Dept Informat & Comp Sci, Linkoping, Sweden
来源
Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings | 2005年
关键词
D O I
10.1109/WETICE.2005.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web browsers, web servers, Java application servers and OSGi frameworks are all instances of Java execution environments that run more or less untrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java application containers. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java container This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java containers for Java applications, applets, servlets, OSGi bundles, and Enterprise Java Beans. For comparison, the requirements are also examined for a C++ application.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 21 条
  • [1] [Anonymous], JAVA SERVLET SPECIFI
  • [2] BACK G, 2000, P 4 S OP SYST DES IM
  • [3] BINDER W, 2000, P ACM C OBJ OR PROGR, P139
  • [4] CALDERON V, 2002, P WORKSH RES MAN SAF
  • [5] CHIUEH T, 2000, P IEEE INT C DISTR C, P394
  • [6] CZAJKOWSKI G, 2000, P ACM C OBJ OR PROGR, P354
  • [7] CZAJKOWSKI G, 1998, P ACM C OBJ OR PROGR, P21
  • [8] Goldberg Ian, 1996, P 6 USENIX UNIX SEC
  • [9] Gollmann D., 1999, COMPUTER SECURITY
  • [10] Gong L., JAVA 2 PLATFORM SECU