Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Applet
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Security== Recent developments in the coding of applications, including mobile and [[embedded system]]s, have led to the awareness of the security of applets. ===Open platform applets=== Applets in an [[open platform]] environment should provide secure interactions between different applications. A compositional approach can be used to provide security for open platform applets.<ref name="Compositional">{{cite book |chapter=Compositional Verification of Secure Applet Interactions |last1=Barthe |first1=Gilles |title=Fundamental Approaches to Software Engineering |volume=2306 |pages=15β32 |last2=Gurov |first2=Dilian |last3=Huisman |first3=Marieke |year=2002 |citeseerx=10.1.1.16.1254 |doi=10.1007/3-540-45923-5_2 |series=Lecture Notes in Computer Science |isbn=978-3-540-43353-8 }}</ref> Advanced compositional verification methods have been developed for secure applet interactions.<ref name="Compositional"/> ===Java applets=== A [[Java applet]] contains different security models: [[Java applet#Unsigned|unsigned Java applet security]], [[Java applet#Signed|signed Java applet security]], and [[Java applet#Self-signed|self-signed Java applet security]]. ===Web-based applets=== In an applet-enabled web browser, many methods can be used to provide applet security for malicious applets. A malicious applet can infect a computer system in many ways, including denial of service, invasion of privacy, and annoyance.<ref name="Controlling">{{cite book |chapter=Controlling Applets' Behavior in a Browser |last1=Hassler |first1=Vesna |title=Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217) |pages=120β125 |last2=Then |first2=Oliver |year=1998 |doi=10.1109/CSAC.1998.738594 |isbn=978-0-8186-8789-1 |s2cid=17633591 }}</ref> A typical solution for malicious applets is to make the web browser to monitor applets' activities. This will result in a web browser that will enable the manual or automatic stopping of malicious applets.<ref name="Controlling"/>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)