Java security: present and near future
暂无分享,去创建一个
[1] Michael D. Schroeder,et al. Cooperation of mutually suspicious subsystems in a computer utility , 1972 .
[2] Anita K. Jones,et al. Protection in programmed systems. , 1973 .
[3] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[4] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[5] William A. Wulf,et al. HYDRA/C.Mmp, An Experimental Computer System , 1981 .
[6] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[7] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[8] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[9] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[10] Roger M. Needham,et al. Denial of service: an example , 1994, CACM.
[11] Peter G. Neumann,et al. Computer-related risks , 1994 .
[12] Guy L. Steele,et al. The Java Language Specification , 1996 .
[13] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[14] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Benedict G. E. Wiedemann. Protection? , 1998, Science.