-
2
-
-
85084162426
-
-
, Jan. 1998.
-
V. Anupam and A. Mayer, Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies, Proc. Seventh USENIX Security Symp., pp. 187-199, Jan. 1998.
-
And A. Mayer, Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies, Proc. Seventh USENIX Security Symp., Pp. 187-199
-
-
Anupam, V.1
-
3
-
-
33749955063
-
-
, Aug. 1998.
-
G. Back, P. Tullmann, L. Stoller, W.C. Hsieh, and J. Lepreau, Java Operating Systems: Design and Implementation, Technical Report UUCS-98-015, Univ. of Utah, Aug. 1998.
-
P. Tullmann, L. Stoller, W.C. Hsieh, and J. Lepreau, Java Operating Systems: Design and Implementation, Technical Report UUCS-98-015, Univ. of Utah
-
-
Back, G.1
-
4
-
-
33749939076
-
-
, Oct. 1997.
-
D. Balfanz and E.W. Feiten, A Java Filter, Technical Report 567-97, Dept. of Computer Science, Princeton Univ., Oct. 1997.
-
And E.W. Feiten, A Java Filter, Technical Report 567-97, Dept. of Computer Science, Princeton Univ.
-
-
Balfanz, D.1
-
9
-
-
0029697575
-
-
, May 1996.
-
D. Dean, E.W. Feiten, and D.S. Wallach, Java Security: From Hotjava to Netscape and Beyond, Proc. IEEE Symp. Security and Privacy, pp. 190-200, May 1996.
-
E.W. Feiten, and D.S. Wallach, Java Security: from Hotjava to Netscape and Beyond, Proc. IEEE Symp. Security and Privacy, Pp. 190-200
-
-
Dean, D.1
-
10
-
-
33749960753
-
-
, Oct. 1997.
-
E.W. Feiten, D. Balfanz, D. Dean, and D.S. Wallach, Web Spoofing: An Internet Con Game, Proc. 20th Nat'1 Information Systems Security Conf., Oct. 1997.
-
D. Balfanz, D. Dean, and D.S. Wallach, Web Spoofing: An Internet Con Game, Proc. 20th Nat'1 Information Systems Security Conf.
-
-
Feiten, E.W.1
-
12
-
-
0003313661
-
-
, May/June 1997.
-
L. Gong, Java Security: Present and Near Future, IEEE Micro, vol. 17, no. 3, pp. 14-19, May/June 1997.
-
Java Security: Present and Near Future, IEEE Micro, Vol. 17, No. 3, Pp. 14-19
-
-
Gong, L.1
-
13
-
-
84887507059
-
-
, Dec. 1997.
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java® Development Kit 1.2, Proc. USENIX Symp. Internet Technologies and Systems, Dec. 1997.
-
M. Mueller, H. Prafullchandra, and R. Schemers, Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java® Development Kit 1.2, Proc. USENIX Symp. Internet Technologies and Systems
-
-
Gong, L.1
-
14
-
-
33749876204
-
-
, Nov. 1997.
-
J. Hartman, L. Peterson, A. Bavier, P. Bigot, P. Bridges, B. Montz, R. Piltz, T. Proebsting, and O. Spatscheck, Joust: A Platform for Communications-Oriented Liquid Software, Technical Report TR97-16, Dept. of Computer Science, Univ. of Arizona, Nov. 1997.
-
L. Peterson, A. Bavier, P. Bigot, P. Bridges, B. Montz, R. Piltz, T. Proebsting, and O. Spatscheck, Joust: a Platform for Communications-Oriented Liquid Software, Technical Report TR97-16, Dept. of Computer Science, Univ. of Arizona
-
-
Hartman, J.1
-
15
-
-
33749975261
-
-
, June 1998.
-
C. Hawblitzel, C. Chang, G. Czajkowski, D. Hu, and T. von Eicken, Implementing Multiple Protection Domains in Java, Proc. Usenix Ann. Technical Conf., June 1998.
-
C. Chang, G. Czajkowski, D. Hu, and T. Von Eicken, Implementing Multiple Protection Domains in Java, Proc. Usenix Ann. Technical Conf.
-
-
Hawblitzel, C.1
-
17
-
-
0023964787
-
-
, 1988.
-
J.H. Howard, M.J. Kazar, S.G. Menées, D.A. Nichols, M. Satyanaraynan, R.N. Sidebotham, and M.J. West, Scale and Performance in a Distributed File System, ACM Trans. Computer Systems, vol. 6, no. 1, pp. 51-81, 1988.
-
M.J. Kazar, S.G. Menées, D.A. Nichols, M. Satyanaraynan, R.N. Sidebotham, and M.J. West, Scale and Performance in a Distributed File System, ACM Trans. Computer Systems, Vol. 6, No. 1, Pp. 51-81
-
-
Howard, J.H.1
-
18
-
-
33749971661
-
-
, 1996.
-
M. Ladue, Pushing the Limits of Java Security, Tricks of the Java Programming Gurus, G. Vanderburg, ed., Sams.net Publishing, 1996.
-
Pushing the Limits of Java Security, Tricks of the Java Programming Gurus, G. Vanderburg, Ed., Sams.net Publishing
-
-
Ladue, M.1
-
21
-
-
0031682432
-
-
, May 1998.
-
D. Malkhi, M. Reiter, and A. Rubin, Secure Execution of Java Applets Using a Remote Playground, Proc. IEEE Symp. Security and Privacy, pp. 40-51, May 1998.
-
M. Reiter, and A. Rubin, Secure Execution of Java Applets Using a Remote Playground, Proc. IEEE Symp. Security and Privacy, Pp. 40-51
-
-
Malkhi, D.1
-
23
-
-
0030645532
-
-
, Feb. 1997.
-
D. Martin, S. Rajagopalan, and A.D. Rubin, Blocking Java Applets at the Firewall, Proc. Internet Soc. Symp. Network and Distributed System Security, pp. 16-26, Feb. 1997.
-
S. Rajagopalan, and A.D. Rubin, Blocking Java Applets at the Firewall, Proc. Internet Soc. Symp. Network and Distributed System Security, Pp. 16-26
-
-
Martin, D.1
-
24
-
-
85088406759
-
-
, Oct. 1996.
-
D. Mosberger and L.L. Peterson, Making Paths Explicit in the Scout Operating System, Proc. Second Operating Systems Design and Implementation Con/, OSDI, pp. 153-167, Oct. 1996.
-
And L.L. Peterson, Making Paths Explicit in the Scout Operating System, Proc. Second Operating Systems Design and Implementation Con/, OSDI, Pp. 153-167
-
-
Mosberger, D.1
-
28
-
-
33749966261
-
-
, Java Remote Method Invocation Specification. 1997.
-
Sun Microsystems, Inc., Java Remote Method Invocation Specification. 1997.
-
Microsystems, Inc.
-
-
Sun1
-
30
-
-
33749973885
-
-
, Jan./Feb. 1999.
-
Z. Rosberg, B. Berg, and J. Wille, IBM Explains How to Use the Remote Abstract Windowing Toolkit (RAWT), AS/400 Network Expert Newsletter, pp. 26-30, Jan./Feb. 1999.
-
B. Berg, and J. Wille, IBM Explains How to Use the Remote Abstract Windowing Toolkit (RAWT), AS/400 Network Expert Newsletter, Pp. 26-30
-
-
Rosberg, Z.1
-
31
-
-
0031542975
-
-
, Oct. 1997.
-
D.S. Wallach, D. Balfanz, D. Dean, and E.W. Feiten, Extensible Security Architectures for Java, Proc. 16th ACM Symp. Operating Systems Principles, Oct. 1997.
-
D. Balfanz, D. Dean, and E.W. Feiten, Extensible Security Architectures for Java, Proc. 16th ACM Symp. Operating Systems Principles
-
-
Wallach, D.S.1
-
32
-
-
33749941213
-
-
, England.
-
K.R. Wood, T. Richardson, F. Bennet, A Harter, and A. Hopper, Global Teleporting with Java: Towards Ubiquitous Personalised Computing, Technical Report 96.2, Olivetti Research Ltd., Cambridge, England.
-
T. Richardson, F. Bennet, a Harter, and A. Hopper, Global Teleporting with Java: Towards Ubiquitous Personalised Computing, Technical Report 96.2, Olivetti Research Ltd., Cambridge
-
-
Wood, K.R.1
|