Abstract
This work presents the networked home environment from
the security point of view. Threats, technologies and the
special characteristics of the users are examined.
'Common Criteria' is used in this thesis as a security
evaluation criterion to construct a protection profile
for the software distribution platform of a networked
home environment. 'Protection profile' describes the
target of the evaluation - the networked home environment
and its security environment, along with access control
and information flow policies. This environment sets the
context for the security requirements that are
established as a result of this thesis to counter the
threats that are also identified in the protection
profile as a part of the security environment.
Java is a relatively promising platform for the networked
software because of its security model, which has evolved
since the first versions of Java. Java's application
programming interfaces provide support for widely used
cryptographic techniques and public key infrastructure
frameworks, including the X.509 authentication framework.
Java's security features are applied to the software
distribution platform developed at VTT Electronics. The
security framework for the platform is developed and
presented in this work.
'Home', as a distributed computing environment, presents
many new issues when compared to typical corporate office
networks. Users are very heterogeneous and their needs
differ from one to another. The requirements
specification must be done with care, and by using
knowledge of the system and existing security techniques
to develop a system that provides adequate
confidentiality, integrity and availability for its
users.
Original language | English |
---|---|
Qualification | Master Degree |
Awarding Institution |
|
Supervisors/Advisors |
|
Place of Publication | Espoo |
Publisher | |
Print ISBNs | 951-38-5865-0 |
Electronic ISBNs | 951-38-5866-9 |
Publication status | Published - 2001 |
MoE publication type | G2 Master's thesis, polytechnic Master's thesis |
Keywords
- public key infrastructure
- security policy
- Java
- distributed software
- protection profile