Basic HTML version of Foils prepared April 7 1998

Foil 10 Structure of Internet and Security-III

From Basic Principles of Java and Internet Security CPS616 Web Technologies -- Spring 98. by Geoffrey C. Fox


1 Finally we need to secure the client. Here Java is particularly important as it (and JavaScript) are the dominant downloaded programs
2 Note clients are typically single user PC's with NO security and so particularly vulnerable to attack.
3 Key difficulty is a bad guy developing a program that when downloaded does something you don't want
4 In real world, we don't invite arbitrary people into our house -- rather we ask for credentials or believe by context (they are an adult accompanying your child's friend) that they are safe
5 So we need both security in Java to check that code is what it purports to be and steps to establish confidence that what one is downloading is likely to be safe

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Nov 29 1998