lecture 1 Disruptive Technologies, mobile code

lecture 1 Disruptive Technologies, mobile code - DISRUPTIVE...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
DISRUPTIVE  TECHNOLOGIES
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
OVERVIEW DISRUPTIVE TECHNOLOGIES DEFINITION  EXAMPLES MOBILE CODE  PEER TO PEER NETWORK
Background image of page 2
DISTRUPTIVE  TECHNOLOGIES Definition: Simple innovations that  radically change the competitive market. Automobile Personal computer Digital cameras Open source software Internet Wireless communication Mobile code Peer to Peer networks etc.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Mobile Code Java, JavaScript, ActiveX
Background image of page 4
Introduction Mobile code : A term that describes any  software that is mobile, being passed from  one system to another. In particular, it is  used to describe applets within web  browsers based upon Microsoft's ActiveX,  Sun's Java, or Netscape's JavaScript  technologies.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Mobile Code Examples Web Applets  Mini-programs written in Java, which are  automatically loaded and run on being  named in an HTML document. A  document can include a number of  applets. These may be sourced from a  number of different servers and run  without the user being aware of them. 
Background image of page 6
Mobile Code Examples (Continued) Dynamic Email  One proposal for the provision of dynamic  email suggested incorporating Safe-TCL  scripts as components of MIME email.  These scripts could be run either on mail  delivery, or when the mail is read by the  recipient. 
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Low-level Security Issues The use of 'mobile code' raises a number of  obvious security issues:  access control - is the use of this code permitted?  user authentication - to identify valid users  data integrity - to ensure the code is delivered  intact  non-repudiation of use of the code - for both the  sender and the receiver especially if its use is  being charged  data confidentiality - to protect sensitive code  auditing - to trace uses of mobile code 
Background image of page 8
Mobile Code Safety The prime focus is on the techniques which can  be used to provide for the safe execution of  imported code on the local system. This has to  address threats due to rogue code being loaded  and run. Of course in many ways, these  problems are not new: they have been a key  component of operating systems design on 
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2010 for the course SECB 408 taught by Professor Wassimelhaj during the Spring '07 term at United Arab Emirates University.

Page1 / 20

lecture 1 Disruptive Technologies, mobile code - DISRUPTIVE...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online