The Java programming language supports the concept of downloadable executable content; a key technology in a wide range of emerging applications including collaborative systems, electronic commerce, and Web information services. Java enables the execution of a program, on almost any modern computer regardless of hardware configuration and operating system. Safe‐Tcl was proposed as an executable content type of MIME and thus as the standard language for executable contents within e‐mail messages. However, the ability to download, integrate, and execute code from a remote computer, provided by both Java and Safe‐Tcl, introduces serious security risks since it enables a malicious remote program to obtain unauthorised access to the downloading system’s resources. In this paper, the two proposed security models are described in detail and the efficiency and flexibility of current implementations are evaluated in a comparative manner. Finally, upcoming extensions are discussed.
[1]
Frank Yellin,et al.
The Java Virtual Machine Specification
,
1996
.
[2]
Gary McGraw,et al.
Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know
,
1997
.
[3]
염흥렬,et al.
[서평]「Applied Cryptography」
,
1997
.
[4]
Hemma Prafullchandra,et al.
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
,
1997,
USENIX Symposium on Internet Technologies and Systems.
[5]
Ken Thompson,et al.
Reflections on trusting trust
,
1984,
CACM.
[6]
Li Gong,et al.
Implementing Protection Domains in the JavaTM Development Kit 1.2
,
1998,
NDSS.
[7]
John K. Ousterhout,et al.
Tcl and the Tk Toolkit
,
1994
.
[8]
Tommy Thorne,et al.
Programming languages for mobile code
,
1997,
CSUR.
[9]
Frank Yellin,et al.
Low Level Security in Java
,
1995,
WWW.