{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:38Z","timestamp":1754157218513,"version":"3.41.2"},"reference-count":16,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1999,3,1]],"date-time":"1999-03-01T00:00:00Z","timestamp":920246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,3,1]]},"abstract":"<jats:p>The Java programming language supports the concept of downloadable executable content; a key technology in a wide range of emerging applications including collaborative systems, electronic commerce, and Web information services. Java enables the execution of a program, on almost any modern computer regardless of hardware configuration and operating system. Safe\u2010Tcl was proposed as an executable content type of MIME and thus as the standard language for executable contents within e\u2010mail messages. However, the ability to download, integrate, and execute code from a remote computer, provided by both Java and Safe\u2010Tcl, introduces serious security risks since it enables a malicious remote program to obtain unauthorised access to the downloading system\u2019s resources. In this paper, the two proposed security models are described in detail and the efficiency and flexibility of current implementations are evaluated in a comparative manner. Finally, upcoming extensions are discussed.<\/jats:p>","DOI":"10.1108\/10662249910251273","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"16-24","source":"Crossref","is-referenced-by-count":6,"title":["Architectures for secure portable executable content"],"prefix":"10.1108","volume":"9","author":[{"given":"Stefanos","family":"Gritzalis","sequence":"first","affiliation":[]},{"given":"George","family":"Aggelis","sequence":"additional","affiliation":[]},{"given":"Diomidis","family":"Spinellis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020620554097100_b1","unstructured":"Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997, \u201cGoing beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2\u201d, Proceedings of the USENIX Symposium on Internet Technologies and Systems, USENIX Association, Monterey, CA, pp. 103\u201012."},{"key":"key2022020620554097100_b2","unstructured":"Gong, L. and Scemers, R. (1998, \u201cImplementing protection domains in the Java Development Kit 1.2\u201d, Proceedings of the Symposium on Network and Distributed System Security, online, http:\/\/isoc\/NDSS98\/"},{"key":"key2022020620554097100_b3","unstructured":"Gritzalis, D. (1991, Information Systems Security, GCS Publications, Athens."},{"key":"key2022020620554097100_b4","unstructured":"Lindhorn, T., and Yellin, F. (1997, The Java Virtual Machine Specification, Addison\u2010Wesley, Reading, MA and Wokingham."},{"key":"key2022020620554097100_b5","unstructured":"McGraw, G. and Felten, E. (1996, Java Security Hostile Applets, Holes and Antidotes, J. Wiley & Sons Inc., New York, NY."},{"key":"key2022020620554097100_b6","unstructured":"Ousterhout, J. (1994, Tcl and the Tk Toolkit, Addison\u2010Wesley, Reading, MA and Wokingham."},{"key":"key2022020620554097100_b7","unstructured":"Schneier, B. (1996, Applied Cryptography, J.Wiley & Sons, New York, NY."},{"key":"key2022020620554097100_b8","unstructured":"Stanton, S. (1998, \u201cTclBlend: Blending Tcl and Java\u201d, Dr. Dobb\u2019s Journal, Vol. 23 No. 2, pp. 50\u20104."},{"key":"key2022020620554097100_b9","unstructured":"Sun Microsystems, (1997a, \u201cFrequently asked questions \u2010 applet security\u201d, online, http:\/\/Java.sun.com\/sfaq\/"},{"key":"key2022020620554097100_b10","unstructured":"Sun Microsystems, (1997b, \u201cSecure computing with Java: now and the future\u201d, online, http:\/\/Java.sun.com\/marketing\/collateral\/security.tml"},{"key":"key2022020620554097100_b11","unstructured":"Sun Microsystems, (1997c, \u201cSecurity in JDK 1.2\u201d, online, http:\/\/Java.sun.com\/docs\/books\/tutorial\/security 1.\/"},{"key":"key2022020620554097100_b12","unstructured":"Sun Microsystems, (1997d, \u201cJacl and Tcl blend\u201d, online, http:\/\/sunscript.sun.com\/Java\/"},{"key":"key2022020620554097100_b13","doi-asserted-by":"crossref","unstructured":"Thompson, K. (1984, \u201cReflections on trusting trust\u201d, Communications of the ACM, Vol. 27 No. 8, pp. 761\u20103.","DOI":"10.1145\/358198.358210"},{"key":"key2022020620554097100_b14","doi-asserted-by":"crossref","unstructured":"Thorn, T. (1997, \u201cProgramming languages for mobile code\u201d, ACM Computing Surveys, Vol. 29 No. 3, pp. 213\u201039.","DOI":"10.1145\/262009.262010"},{"key":"key2022020620554097100_b15","unstructured":"Weiss, M., Johnson, A. and Kiniry, J. (1996, \u201cSecurity features of Java and HotJava\u201d, Open Software Foundation Research Institute, online. htpp:\/\/user\/cs.tu\u2010berlin. e\/\u223cmajo\/java\/security.htm"},{"key":"key2022020620554097100_b16","doi-asserted-by":"crossref","unstructured":"Yellin, F. (1995, \u201cLow level security in Java\u201d, online. http: \/\/Java.sun.com\/sfaq\/verifier.html","DOI":"10.1145\/3592626.3592656"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910251273\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910251273\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:58Z","timestamp":1753400458000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/1\/16-24\/180704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,3,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,3,1]]}},"alternative-id":["10.1108\/10662249910251273"],"URL":"https:\/\/doi.org\/10.1108\/10662249910251273","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1999,3,1]]}}}