skip to main content
article
Free Access

Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl

Authors Info & Claims
Published:01 April 1998Publication History
Skip Abstract Section

Abstract

JAVA is claimed to be a system programming language having a number of advantages over traditional programming languages. These advantages stem from the fact that it is a platform - independent language, thus promising truly network oriented computing as long as a nearly universal system for distributing applications. On the other hand, although being an interpreted, much simpler, scripting language, Safe-Tcl was proposed as an executable contents type of MIME and thus as the standard language for executable contents within email. Consequently, both languages claim to be suitable for transmitting executable content over the Internet, in other words manipulating mobile code. However, the ability to download, integrate, and execute code from a remote computer raises serious concerns about JAVA's as well as Safe-Tcl's effect on network security. In this paper, the potential security risks of mobile code are discussed, a brief introduction to both programming languages is given, and the details of each of the proposed security mechanisms are presented. Finally a comparison of the two security models is given, centered upon the efficiency and flexibility of current implementations as well as upcoming extensions.

References

  1. {Balfanz, 1997a} D. Balfanz, L. Gong, (1997) "Secure Multi-Processing in Java".Google ScholarGoogle Scholar
  2. {Balfanz, 1997b} D. Balfanz, E. W. Felten, (1997) "A JavaFilter", available at http://www.princeton.cs.edu/sipGoogle ScholarGoogle Scholar
  3. {Bank, 1995} "Java Security", available at http://www-swiss.ai.mit.edu/~jbank/javapaper/javapaper.htmlGoogle ScholarGoogle Scholar
  4. {Borenstein, 1993} Borenstein N, Rose M. T., (1993) "MIME Extensions for Mail-Enabled Applications: application/Safe-Tcl and multipart/enabled-mail"Google ScholarGoogle Scholar
  5. {Felten, 1997} E. W. Felten, D. Balfanz, D. Dean, D. S. Wallach, (1997) "Web Spoofing: An Internet Con Game", Proceedings of the 20th National Information Systems Security Conference.Google ScholarGoogle Scholar
  6. {Goldstein, 1996} Goldstein T., (1996) "The Gateway Security Model in the Java Electronic Commerce Framework", JavaSoft, available at http://www.javasoft.com/products/commerce/jectf_gateway.psGoogle ScholarGoogle Scholar
  7. {Gong, 1997a} L. Gong, M. Mueller, H. Prafullchandra, R. Schemers, (1997) "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2", Proceedings of the USENIX Symposium on Internet Technologies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {Gong, 1997b} L. Gong, (1997) "New Security Architectural Directions for Java", Proceedings of IEEE COMPCON. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {Gritzalis, 1991} Gritzalis D., (1991) Information Systems Security, GCS Publications (in Greek).Google ScholarGoogle Scholar
  10. {Martin, 1997} Martin D., Rajagopalan S., Rubin A., (1997) "Blocking Java Applets at the Firewall", Proceedings of the SNDSS 1997 Symposium on Network and Distributed System Security, pp. 123-133, IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. {McGraw, 1996} McGraw G., Felten E., (1996) "Java Security Hostile Applets, Holes and Antidotes", J. Wiley & Sons Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {Ousterhout, 1996} Ousterhout J. K., (1996) "The Safe-Tcl Security Model".Google ScholarGoogle Scholar
  13. {Ousterhout, 1997} Ousterhout J. K., (1997) "Scripting: Higher Level Programming for the21st Century".Google ScholarGoogle Scholar
  14. {Scheneier, 1996} Scheneier B., "Applied Cryptography", J. Wiley & Sons.Google ScholarGoogle Scholar
  15. {Sun, 1997a} Sun Microsystems, (1997) Frequently Asked Questions - Applet Security, at http://java.sun.com/sfaq/Google ScholarGoogle Scholar
  16. {Sun, 1997b} Sun Microsystems, (1997) "Secure Computing with Java: Now and the Future", at http://java.sun.com/marketing/collateral/security.htmGoogle ScholarGoogle Scholar
  17. {Sun, 1997c} "The Java Virtual Machine Specification", (1997) available at http://java.sun.com/docs/books/vmspec/Google ScholarGoogle Scholar
  18. {Sun, 1997d} "Jacl and Tcl Blend", (1997) available at http://sunscript.sun.com/java/Google ScholarGoogle Scholar
  19. {Thorn, 1997} Thorn T., (1997) "Programming Languages for Mobile Code".Google ScholarGoogle Scholar
  20. {Venners, 1997} Venners B., (1997) "Java's security architecture", available at http://www.javaworld.com/javaworld/jw-08-1997/jw-08-hood.htmlGoogle ScholarGoogle Scholar
  21. {Wallach, 1997} D. S. Wallach, D. Balfanz, D. Dean, E. W. Felten, (1997) "Extensible Security Architectures for Java", Proceedings of the 16th Symposium on Operating Systems Principles. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. {Weiss, 1996} Weiss M., Johnson A., Kiniry J., (1996) "Security Features of Java and HotJava".Google ScholarGoogle Scholar
  23. {Yellin, 1995} Yellin F., (1995) Low Level Security in Java, at http://java.sun.com/sfaq/verifier.htmlGoogle ScholarGoogle Scholar
  24. {Zhang, 1997} X. N. Zhang, "Secure Code Distribution", (1997) IEEE Computer, June 1997, pp.76-79. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 32, Issue 2
          April 1998
          32 pages
          ISSN:0163-5980
          DOI:10.1145/506133
          Issue’s Table of Contents

          Copyright © 1998 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 1998

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader