DocumentCode :
2510179
Title :
Using JavaTM to Design Forensically Resistant Applications
Author :
Jeannot, Cedric J. ; Imam, Ibrahim N. ; Elmaghraby, Adel S.
Author_Institution :
Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY, USA
fYear :
2009
fDate :
21-21 May 2009
Firstpage :
38
Lastpage :
41
Abstract :
Over the years, JavaTM has become a popular language for standalone as well as Web based applications. Portability and security are the major reasons for JavaTM success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.
Keywords :
Internet; Java; security of data; software portability; Java security model; Web based applications; design forensics resistant application; portability; security evaluation; Application software; Cryptography; Data security; Design engineering; File systems; Forensics; Information security; Java; Monitoring; Operating systems; Design; Forensic attacks; Java; Monitor;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systematic Approaches to Digital Forensic Engineering, 2009. SADFE '09. Fourth International IEEE Workshop on
Conference_Location :
Berkeley, CA
Print_ISBN :
978-0-7695-3792-4
Type :
conf
DOI :
10.1109/SADFE.2009.14
Filename :
5341553
Link To Document :
بازگشت