Guidelines on Active Content and Mobile Code

[1]  Niels Provos,et al.  All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.

[2]  Ian Jacobs,et al.  Cascading Style Sheets, level 2 CSS2 Specification , 2008 .

[3]  Karen A. Scarfone,et al.  SP 800-44 Version 2. Guidelines on Securing Public Web Servers , 2007 .

[4]  Niels Provos,et al.  The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.

[5]  Michael W. Godfrey,et al.  Architecture and evolution of the modern web browser , 2006 .

[6]  Peter Mell,et al.  SP 800-40 Version 2.0. Creating a Patch and Vulnerability Management Program , 2005 .

[7]  Peter Mell,et al.  Creating a Patch and Vulnerability Management Program , 2005 .

[8]  Michael W. Godfrey,et al.  A reference architecture for Web browsers , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).

[9]  Richard R. Brooks,et al.  Mobile code paradigms and security issues , 2004, IEEE Internet Computing.

[10]  T. Grance,et al.  Computer Security Incident Handling Guide , 2004 .

[11]  Daniel C. DuVarney,et al.  Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.

[12]  Bill McCarty,et al.  Botnets: Big and Bigger , 2003, IEEE Secur. Priv..

[13]  John Zachary Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..

[14]  Hailin Wu,et al.  The privacy practices of Web browser extensions , 2001, CACM.

[15]  Richard C. Holt,et al.  A reference architecture for Web servers , 2000, Proceedings Seventh Working Conference on Reverse Engineering.

[16]  Edward Roback,et al.  SP 800-23. Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products , 2000 .

[17]  Edward A. Roback Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products. Recommendations of the National Institute of Standards and Technology , 2000 .

[18]  Gian Pietro Picco,et al.  Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[19]  Sergio Loureiro,et al.  Mobile code security , 2000 .

[20]  Michael A. Cusumano,et al.  Software Development on Internet Time , 1999, Computer.

[21]  Kent L. Beck,et al.  Embracing Change with Extreme Programming , 1999, Computer.

[22]  Alain J. Mayer,et al.  Secure Web Scripting , 1998, IEEE Internet Comput..

[23]  Thorsten von Eicken,et al.  JRes: a resource accounting interface for Java , 1998, OOPSLA '98.

[24]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[25]  James A. Gosling,et al.  The java language environment: a white paper , 1995 .

[26]  Nathaniel S. Borenstein,et al.  MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.

[27]  Arthur Conan Sir Doyle,et al.  The study in scarlet , 1887 .