메뉴 건너뛰기




Volumn 25, Issue 5, 2006, Pages 338-350

Comparing Java and .NET security: Lessons learned and missed

Author keywords

.NET security; Bytecode verifier; Code safety; Java security; Malicious code; Security design principles; Virtual machine security

Indexed keywords

COMPUTER PROGRAMMING; JAVA PROGRAMMING LANGUAGE; VIRTUAL REALITY; WEBSITES;

EID: 33746687945     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.02.003     Document Type: Article
Times cited : (9)

References (53)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • AlephOne. Smashing the stack for fun and profit. Phrack 7 49 (November 1996)
    • (1996) Phrack , vol.7 , Issue.49
    • AlephOne1
  • 3
    • 33746738341 scopus 로고    scopus 로고
    • Design and usability in security systems - daily life as a context of use?
    • Clear T. Design and usability in security systems - daily life as a context of use?. ACM SIGCSE Bulletin 4 34 (December 2002)
    • (2002) ACM SIGCSE Bulletin , vol.4 , Issue.34
    • Clear, T.1
  • 4
    • 33746744561 scopus 로고    scopus 로고
    • Cook WR. A proposal for making Eiffel type-safe. In: Third European conference on object-oriented programming (ECOOP); July 1989.
  • 8
    • 33746730628 scopus 로고    scopus 로고
    • ECMA International. Standard ECMA-335: common language infrastructure. 2nd ed. ; December 2002.
  • 9
    • 33746761198 scopus 로고    scopus 로고
    • Erlingsson Úlfar. The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University Department of Computer Science (Technical Report 2003-1916); 2003.
  • 14
    • 33746748947 scopus 로고    scopus 로고
    • Java security bug (applets can load native methods)
    • Hopwood D. Java security bug (applets can load native methods). Risks Forum (March 1996)
    • (1996) Risks Forum
    • Hopwood, D.1
  • 18
    • 0000058182 scopus 로고    scopus 로고
    • Java bytecode verification: an overview
    • Springer Verlag p. 265-85
    • Leroy X. Java bytecode verification: an overview. Computer aided verification vol. 2101 (2001), Springer Verlag p. 265-85
    • (2001) Computer aided verification , vol.2101
    • Leroy, X.1
  • 19
    • 33746662450 scopus 로고    scopus 로고
    • Lewin Mark. Email communication; January 2004.
  • 30
    • 0026972623 scopus 로고    scopus 로고
    • Pierce Benjamin C. Bounded quantification is undecidable. In: ACM SIGPLAN symposium on principles of programming languages (POPL); January 1992.
  • 33
    • 33746669518 scopus 로고    scopus 로고
    • Saltzer Jerome, Schroeder Michael. The protection of information in computer systems. In: Fourth ACM symposium on operating system principles; October 1973 [revised version in Communications of the ACM, July 1974].
  • 36
    • 33746773216 scopus 로고    scopus 로고
    • Sun Microsystems. JSR 202: Java Class File Specification Update, .
  • 37
    • 33746699131 scopus 로고    scopus 로고
    • Sun Microsystems. New Java SE Mustang Feature: Type Checking Verifier, .
  • 50
    • 33746702791 scopus 로고    scopus 로고
    • Walker David. A type system for expressive security policies. In: ACM SIGPLAN symposium on principles of programming languages (POPL); January 2000.
  • 52
    • 33746732428 scopus 로고    scopus 로고
    • Wallach Dan, Balfanz Dirk, Dean Drew, Felten Edward. Extensible security architectures for Java. In: Symposium on operating systems principles; October 1997.
  • 53
    • 33746772278 scopus 로고    scopus 로고
    • Yellin Frank. Low level security in Java. In: Fourth international WWW conference; December 1995.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.