Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Building Internet Firewalls
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
X through the firewall, and other application relays
Usenix-stc'93 Proceedings of the USENIX Summer 1993 Technical Conference on Summer technical conference - Volume 1
Security issues in distributed software
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
Role-based access control in Java
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Role-based access control on the Web using Java
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 7th ACM conference on Computer and communications security
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl
ACM SIGOPS Operating Systems Review
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
IEEE Internet Computing
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Towards Secure Downloadable Executable Content: The Java Paradigm
SAFECOMP '98 Proceedings of the 17th International Conference on Computer Safety, Reliability and Security
Mobile Agents and Security
DHTTP: an efficient and cache-friendly transfer protocol for the web
IEEE/ACM Transactions on Networking (TON)
A review of information security issues and respective research contributions
ACM SIGMIS Database
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Configuration management and security
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Detecting web bugs with bugnosis: privacy advocacy through education
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Coping with denial of service due to malicious Java applets
Computer Communications
Hi-index | 0.00 |
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.