A java security model based on information flow control
碩士 === 國立臺灣大學 === 電機工程研究所 === 84 === The introduction of Java has accelerated the wide acceptance of World Wide Web and its associated applications and data. Since Java code can be transported across networks, security becomes extremely im...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
1996
|
Online Access: | http://ndltd.ncl.edu.tw/handle/69956866302920413400 |
id |
ndltd-TW-084NTU00442121 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-084NTU004421212016-07-13T04:10:54Z http://ndltd.ncl.edu.tw/handle/69956866302920413400 A java security model based on information flow control 一個使用資訊流控制的爪哇安全模型 Chih-Yuh Chang 張志聿 碩士 國立臺灣大學 電機工程研究所 84 The introduction of Java has accelerated the wide acceptance of World Wide Web and its associated applications and data. Since Java code can be transported across networks, security becomes extremely important. Due to the complexity of access control list that the current Java security model based on, maintaining the security of a Java environment becomes a very difficult task for system administrators, and a challenge for common network users. In this thesis, we propose a new Java security model based on information flow control to enhance the system security. Moreover, we also simplify the management of the security of Java environments and reduce the chance of falling into traps caused by careless operations. Our security model is based on the information flow control to make the Java distributed environment more secure, and to simplify the operations of system security to provide a user-friendly interface. For typical users, they would like to have a more secure manager to loosen up with the simplified administration. For Java developers, they could enjoy the system resources that they need to code without worrying to leak any information to unauthorized users. For system administrators, it makes their jobs easier that all users in the system can work in a more secure environment. Our proposed model is the first one to achieve all these features. Chin-Laung Lei 雷欽隆 1996 學位論文 ; thesis 57 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電機工程研究所 === 84 === The introduction of Java has accelerated the wide acceptance of
World Wide Web and its associated applications and data. Since
Java code can be transported across networks, security becomes
extremely important. Due to the complexity of access control
list that the current Java security model based on, maintaining
the security of a Java environment becomes a very difficult
task for system administrators, and a challenge for common
network users. In this thesis, we propose a new Java security
model based on information flow control to enhance the system
security. Moreover, we also simplify the management of the
security of Java environments and reduce the chance of falling
into traps caused by careless operations. Our security model
is based on the information flow control to make the Java
distributed environment more secure, and to simplify the
operations of system security to provide a user-friendly
interface. For typical users, they would like to have a more
secure manager to loosen up with the simplified administration.
For Java developers, they could enjoy the system resources that
they need to code without worrying to leak any information to
unauthorized users. For system administrators, it makes their
jobs easier that all users in the system can work in a more
secure environment. Our proposed model is the first one to
achieve all these features.
|
author2 |
Chin-Laung Lei |
author_facet |
Chin-Laung Lei Chih-Yuh Chang 張志聿 |
author |
Chih-Yuh Chang 張志聿 |
spellingShingle |
Chih-Yuh Chang 張志聿 A java security model based on information flow control |
author_sort |
Chih-Yuh Chang |
title |
A java security model based on information flow control |
title_short |
A java security model based on information flow control |
title_full |
A java security model based on information flow control |
title_fullStr |
A java security model based on information flow control |
title_full_unstemmed |
A java security model based on information flow control |
title_sort |
java security model based on information flow control |
publishDate |
1996 |
url |
http://ndltd.ncl.edu.tw/handle/69956866302920413400 |
work_keys_str_mv |
AT chihyuhchang ajavasecuritymodelbasedoninformationflowcontrol AT zhāngzhìyù ajavasecuritymodelbasedoninformationflowcontrol AT chihyuhchang yīgèshǐyòngzīxùnliúkòngzhìdezhǎowaānquánmóxíng AT zhāngzhìyù yīgèshǐyòngzīxùnliúkòngzhìdezhǎowaānquánmóxíng AT chihyuhchang javasecuritymodelbasedoninformationflowcontrol AT zhāngzhìyù javasecuritymodelbasedoninformationflowcontrol |
_version_ |
1718346217235152896 |