The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic Web services. With the proliferation of network attacks on these network resources, much work has been done to provide security for the network environment. Continuing work on firewalls, intrusion detection, and even access control have provided numerous insights and capabilities for protecting Web resources. Java itself has received much attention in the security arena, and the Java 2(TM) Architecture has provided considerable inroads to providing security services. However, this research has operated under the assumption that attacks only occur through the network and not with direct access to the Web server through a valid login. Little effort has been placed on securing a Java Web server where the attacker has a valid login to the host machine. This paper describes specific security extensions developed for a Java Virtual Machine that provide assurance of correct system operation and integrity even in the presence of successful attacks on the underlying operating system.
[1]
Marco Pistoia,et al.
JAVA 2 Network Security (2nd Edition)
,
1999
.
[2]
Li Gong,et al.
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
,
1999
.
[3]
Xiangmin Zhang,et al.
Java Security
,
2000
.
[4]
Scott Oaks,et al.
Java Security
,
1998
.
[5]
Ralph Johnson,et al.
design patterns elements of reusable object oriented software
,
2019
.
[6]
V.V.S. Raveendra.
Inside java 2 platform security: architecture, API design and implementation [Book Review]
,
2002,
IEEE Software.
[7]
Frank Yellin,et al.
The Java Virtual Machine Specification
,
1996
.