The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A specification of Java loading and bytecode verification
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
A secure execution framework for Java
Proceedings of the 7th ACM conference on Computer and communications security
A formal specification of Java class loading
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IEEE Internet Computing
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2)
HASE '99 The 4th IEEE International Symposium on High-Assurance Systems Engineering
An Evaluation of the Java Security Model
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
User Authentication and Authorization in the Java(tm) Platform
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Supporting Real World Security Models in Java
FTDCS '99 Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems
Hi-index | 0.00 |
We discuss how integrity of components of Java applications can be protected. Intrinsic and extrinsic protection mechanisms are employed. Capabilities of the Java application programming interface include permissions and signed JAR files. The strength of the methods depends on the operating system in which the Java virtual machine is embedded. Possible attacks by Trojan horse programs on component integrity are given and an approach to prevent or detect these is presented.