• DocumentCode
    2089474
  • Title

    Trade-off analysis between security policies for Java mobile codes and requirements for Java application

  • Author

    Kaiya, Haruhiko ; Sasaki, Kouta ; Maebashi, Yasunori ; Kaijiri, Kenji

  • Author_Institution
    Dept. of Comput. Sci., Shinshu Univ., Nagano, Japan
  • fYear
    2003
  • fDate
    8-12 Sept. 2003
  • Firstpage
    357
  • Lastpage
    358
  • Abstract
    We propose a method for analyzing trade-off between security policies for Java mobile codes and requirements for Java application. We assume that mobile codes are downloaded from different sites, they are used in an application on a site, and their functions are restricted by security policies on the site. We clarify which functions to be performed under the policies on the site using our tool [H. Kaiya et al., (2002)]. We also clarify which functions are needed so as to meet the requirements for the application by goal oriented requirements analysis (GORA). By comparing functions derived from the policies and functions from the requirements, we find conflicts between the policies and the requirements, and also find vagueness of the requirements.
  • Keywords
    Java; distributed programming; formal specification; security of data; systems analysis; Java mobile code; goal oriented requirements analysis; security policies; trade-off analysis; Application software; Computer science; Computer security; Electronic learning; International collaboration; Java; Mobile computing; Permission; Privacy; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Engineering Conference, 2003. Proceedings. 11th IEEE International
  • ISSN
    1090-705X
  • Print_ISBN
    0-7695-1980-6
  • Type

    conf

  • DOI
    10.1109/ICRE.2003.1232785
  • Filename
    1232785