首页> 外文会议>IFIP / WG11.5 working conference on integrity and internal control in information systems >PROTECTING JAVA COMPONENT INTEGRITY AGAINST TROJAN HORSE PROGRAMS
【24h】

PROTECTING JAVA COMPONENT INTEGRITY AGAINST TROJAN HORSE PROGRAMS

机译:保护Java组分完整性对特洛伊木马课程

获取原文

摘要

We discuss how integrity of components of Java applications can be protected. Intrinsic and extrinsic protection mechanisms are employed. Capabilities of the Java application programming interface include permissions and signed JAR files. The strength of the methods depends on the operating system in which the Java virtual machine is embedded. Possible attacks by Trojan horse programs on component integrity are given and an approach to prevent or detect these is presented.
机译:我们讨论如何保护Java应用程序的组件的完整性。使用内在和外部保护机制。 Java应用程序编程接口的功能包括权限和签名的JAR文件。这些方法的强度取决于嵌入Java虚拟机的操作系统。给出了特洛伊木马程序对组件完整性的可能攻击,并提出了一种防止或检测这些的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号