Skip to main content

Signing, Sealing, and Guarding Java™ Objects

  • Chapter
  • First Online:
Mobile Agents and Security

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1419))

Abstract

Many secure applications are emerging using the Java™ language and running on the Java platform. In dealing with Java security issues, especially when building secure mobile agents on the Java plat-form, we inevitably depend on the underlying object orientation, such as data encapsulation and type safety.

In this paper, we describe three new constructs for signing, sealing (encrypting), and guarding Java objects. These constructs enrich the existing Java security APIs so that a wide range of security-aware applications can be significantly easier to build.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns. Addison-Wesley, Menlo Park, California, 1995.

    MATH  Google Scholar 

  2. T.C. Goldstein. The Gateway Security Model in the Java Electronic Commerce Framework. In Proceedings of Financial Cryptography 97, pages 291–304, Anguilla, British Virgin Island, February 1997. To be published by Springer Verlag.

    Google Scholar 

  3. L. Gong. Java Security: Present and Near Future. IEEE Micro, 17(3):14–19, May/June 1997.

    Article  MathSciNet  Google Scholar 

  4. L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java™ Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pages 103–112, Monterey, California, December 1997.

    Google Scholar 

  5. J. Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Addison-Wesley, Menlo Park, California, August 1996.

    MATH  Google Scholar 

  6. T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Addison-Wesley, Menlo Park, California, 1997.

    Google Scholar 

  7. L. van Doorn, M. Abadi, M. Burrows, and E. Wobber. Secure Network Objects. In Proceedings of the IEEE Symposium in Security and Privacy, pages 211–221, Oakland, California, May 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Gong, L., Schemers, R. (1998). Signing, Sealing, and Guarding Java™ Objects. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-68671-1_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64792-8

  • Online ISBN: 978-3-540-68671-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics