A SUPPORTING TOOL TO IDENTIFY BOTH SATISFIED REQUIREMENTS AND TOLERANT THREATS FOR A JAVA MOBILE CODE APPLICATION

Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, Kenji Kaijiri

2006

Abstract

A mobile code application can be easily integrated by using existing software components, thus it is one of the promising ways to develop software efficiently. However, using a mobile code application sometimes follows harmful effects on valuable resources of users because malicious codes in such an application can be activated. Therefore, users of mobile code applications have to identify both benefits and risks by the applications and to decide which benefits should be gotten and which risks should be tolerated. In this paper, we introduce a tool to support such users. By using this tool, the users can identify security related functions embedded in each mobile code automatically. The users can also relate these functions to each benefit or risk. By defining a security policy for mobile codes, some functions are disabled, thus some benefits and risks are also disabled. By adjusting the security policy, the users can make decision about the benefits and the risks.

Download


Paper Citation


in Harvard Style

Kaiya H., Sasaki K., Ogawa C. and Kaijiri K. (2006). A SUPPORTING TOOL TO IDENTIFY BOTH SATISFIED REQUIREMENTS AND TOLERANT THREATS FOR A JAVA MOBILE CODE APPLICATION . In Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-972-8865-43-6, pages 444-448. DOI: 10.5220/0002445604440448

in Bibtex Style

@conference{iceis06,
author={Haruhiko Kaiya and Kouta Sasaki and Chikanobu Ogawa and Kenji Kaijiri},
title={A SUPPORTING TOOL TO IDENTIFY BOTH SATISFIED REQUIREMENTS AND TOLERANT THREATS FOR A JAVA MOBILE CODE APPLICATION},
booktitle={Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2006},
pages={444-448},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002445604440448},
isbn={978-972-8865-43-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - A SUPPORTING TOOL TO IDENTIFY BOTH SATISFIED REQUIREMENTS AND TOLERANT THREATS FOR A JAVA MOBILE CODE APPLICATION
SN - 978-972-8865-43-6
AU - Kaiya H.
AU - Sasaki K.
AU - Ogawa C.
AU - Kaijiri K.
PY - 2006
SP - 444
EP - 448
DO - 10.5220/0002445604440448