Abstract
Rapid growth of Internet was only possible when document description languages (esp. HTML), exchange protocols (HTTP) and navigation tools such as Netscape’s browser and Internet Explorer were available for mass usage. Basic Internet features (protocols, esp. TCP/IP, domain organisation and routing concepts), navigation tools and document description languages have been specified without observing relevant security requirements esp. concerning confidentiality of sensitive processes and data. Moreover, essential safety aspects — availability, reliability, maintainability, functionality — have also been neglected. As security and safety are „design-inherent“ features (i.e. they must be specified in design and enforced in implemented systems), later enhancements (such as IP v.6 including authentication and encryption, protocols such as S-HTTP, SSL or SET) can at best reduce risks, but they can NOT cure past design faults.
Chapter PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Brunnstein, K. (1997). Analysis of JAVA Security and Hostile Applets. In: Yngström, L., Carlsen, J. (eds) Information Security in Research and Business. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35259-6_23
Download citation
DOI: https://doi.org/10.1007/978-0-387-35259-6_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5481-0
Online ISBN: 978-0-387-35259-6
eBook Packages: Springer Book Archive