Basic HTML version of Foils prepared May 19 99

Foil 10 Structure of Internet and Security-III

From Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 -- Spring Semester 1999. by Geoffrey Fox, Mehmet Sen


1 Finally we need to secure the client. Here Java is particularly important as it (and JavaScript) are the dominant downloaded programs
2 Note clients are typically single user PC's with NO security and so particularly vulnerable to attack.
3 Key difficulty is a bad guy developing a program that when downloaded does something you don't want
4 In real world, we don't invite arbitrary people into our house -- rather we ask for credentials or believe by context (they are an adult accompanying your child's friend) that they are safe
5 So we need both security in Java to check that code is what it purports to be and steps to establish confidence that what one is downloading is likely to be safe

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed May 19 1999