paper index | HOME

Title: A Supporting Tool to Identify Both Satisfied Requirements and Tolerant Threats for A Java Mobile Code Application
Author(s): Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, and Kenji Kaijiri.
Source: In Proc. of the 8th Internatinal Confe rence on Enterprise Information Systems (ICEIS 2006), pp. 444-448, Paphos, Cyprus, May 2006.


A mobile code application can be easily integrated by using existing software components, thus it is one of the promising ways to develop software efficiently. However, using a mobile code application sometimes follows harmful effects on valuable resources of users because malicious codes in such an application can be activated. Therefore, users of mobile code applications have to identify both benefits and risks by the applications and to decide which benefits should be gotten and which risks should be tolerated. In this paper, we introduce a tool to support such users. By using this tool, the users can identify security related functions embedded in each mobile code automatically. The users can also relate these functions to each benefit or risk. By defining a security policy for mobile codes, some functions are disabled, thus some benefits and risks are also disabled. By adjusting the security policy, the users can make decision about the benefits and the risks.
4 pages, ( 104 K bytes, gziped postscript) or ( 142 K bytes, PDF)
BibTeX Entry:
@Inproceedings(,
    Title="{A Supporting Tool to Identify Both Satisfied Requirements and Tolerant Threats 
            for A Java Mobile Code Application}",
    Author="Haruhiko Kaiya and Kouta Sasaki and Chikanobu Ogawa and Kenji Kaijiri",
    Booktitle="Proc. of the 8th Internatinal Conference on 
    Enterprise Information Systems (ICEIS 2006)",
    Year="2006",
    Editor="",
    Pages="444-448",
    Organization="",
    Publisher="",
    Address="Paphos, Cyprus",
    Month="May",
)

Related Paper(s): Apr. 2004.