Guidelines on Active Content and Mobile Code
暂无分享,去创建一个
[1] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[2] Ian Jacobs,et al. Cascading Style Sheets, level 2 CSS2 Specification , 2008 .
[3] Karen A. Scarfone,et al. SP 800-44 Version 2. Guidelines on Securing Public Web Servers , 2007 .
[4] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[5] Michael W. Godfrey,et al. Architecture and evolution of the modern web browser , 2006 .
[6] Peter Mell,et al. SP 800-40 Version 2.0. Creating a Patch and Vulnerability Management Program , 2005 .
[7] Peter Mell,et al. Creating a Patch and Vulnerability Management Program , 2005 .
[8] Michael W. Godfrey,et al. A reference architecture for Web browsers , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[9] Richard R. Brooks,et al. Mobile code paradigms and security issues , 2004, IEEE Internet Computing.
[10] T. Grance,et al. Computer Security Incident Handling Guide , 2004 .
[11] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[12] Bill McCarty,et al. Botnets: Big and Bigger , 2003, IEEE Secur. Priv..
[13] John Zachary. Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..
[14] Hailin Wu,et al. The privacy practices of Web browser extensions , 2001, CACM.
[15] Richard C. Holt,et al. A reference architecture for Web servers , 2000, Proceedings Seventh Working Conference on Reverse Engineering.
[16] Edward Roback,et al. SP 800-23. Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products , 2000 .
[17] Edward A. Roback. Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products. Recommendations of the National Institute of Standards and Technology , 2000 .
[18] Gian Pietro Picco,et al. Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[19] Sergio Loureiro,et al. Mobile code security , 2000 .
[20] Michael A. Cusumano,et al. Software Development on Internet Time , 1999, Computer.
[21] Kent L. Beck,et al. Embracing Change with Extreme Programming , 1999, Computer.
[22] Alain J. Mayer,et al. Secure Web Scripting , 1998, IEEE Internet Comput..
[23] Thorsten von Eicken,et al. JRes: a resource accounting interface for Java , 1998, OOPSLA '98.
[24] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[25] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[26] Nathaniel S. Borenstein,et al. MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.
[27] Arthur Conan Sir Doyle,et al. The study in scarlet , 1887 .