-
8
-
-
0004256091
-
-
John Wiley & Sons, New York, NY
-
Gollmann D. (1999), Computer Security, John Wiley & Sons, New York, NY.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
9
-
-
0030674187
-
New security architectural directions for Java
-
Gong L. (1997), "New security architectural directions for Java", Proceedings of IEEE COMPCON.
-
(1997)
Proceedings of IEEE COMPCON
-
-
Gong, L.1
-
10
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
-
Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997), "Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2", Proceedings of the USENIX Symposium on Internet Technologies.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
11
-
-
6744222774
-
Applet watch-dog: A monitor controlling the execution of Java applets
-
Gorrieri, R. and Marchetti, R. (1998), "Applet watch-dog: a monitor controlling the execution of Java applets", Proceedings of the IFIP SEC'98, Austrian Computer Society, pp. 15-23.
-
(1998)
Proceedings of the IFIP SEC'98, Austrian Computer Society
, pp. 15-23
-
-
Gorrieri, R.1
Marchetti, R.2
-
12
-
-
0030265092
-
Towards a formal system-to-system authentication protocol
-
Elsevier
-
Gritzalis, D. and Katsikas, S. (1996), "Towards a formal system-to-system authentication protocol", Computer Communications, Vol. 19, Elsevier, pp. 954-61.
-
(1996)
Computer Communications
, vol.19
, pp. 954-961
-
-
Gritzalis, D.1
Katsikas, S.2
-
14
-
-
85037790417
-
-
Iona Information
-
Iona Information (1998), Orbix Home found at
-
(1998)
-
-
-
15
-
-
85037801784
-
-
Java Security
-
Java Security (1998), available at
-
(1998)
-
-
-
17
-
-
85037794048
-
-
Object Management Group (OMG) (1999), available at
-
(1999)
-
-
-
18
-
-
85037800299
-
-
RMI Specification
-
RMI Specification (1997a), available at
-
(1997)
-
-
-
19
-
-
85037794408
-
-
RMI Tutorial
-
RMI Tutorial (1997b), available at
-
(1997)
-
-
-
20
-
-
0003613518
-
-
Microsoft Press, Redwood, WA
-
Rogerson, D. (1997), Inside COM, Microsoft Press, Redwood, WA.
-
(1997)
Inside COM
-
-
Rogerson, D.1
-
21
-
-
0003168891
-
Security requirements, risks, and recommendations for small enterprise and home-office environments
-
Spinellis, D., Kokolakis, S. and Gritzalis S. (1999), "Security requirements, risks, and recommendations for small enterprise and home-office environments", Information Management and Computer Security, Vol. 7 No. 3, pp. 121-8.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.3
, pp. 121-128
-
-
Spinellis, D.1
Kokolakis, S.2
Gritzalis, S.3
-
23
-
-
6744219558
-
Security in TINA
-
published by Austrian Computer Society
-
Staamann, S., Buttyan, L. and Wilhelm U. (1998), "Security in TINA", Proceedings of the 14th IFIPSEC '98 International Information Security Conference, published by Austrian Computer Society, pp. 111-22.
-
(1998)
Proceedings of the 14th IFIPSEC '98 International Information Security Conference
, pp. 111-122
-
-
Staamann, S.1
Buttyan, L.2
Wilhelm, U.3
|