-
1
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
-
USENIX Association Monterey, CA
-
Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997, "Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2", Proceedings of the USENIX Symposium on Internet Technologies and Systems, USENIX Association, Monterey, CA, pp. 103-12.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
, pp. 103-12
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
4
-
-
0004220511
-
-
Addison-Wesley Reading, MA Wokingham.
-
Lindhorn, T., and Yellin, F. (1997, The Java Virtual Machine Specification, Addison-Wesley, Reading, MA and Wokingham.
-
(1997)
The Java Virtual Machine Specification
-
-
Lindhorn, T.1
Yellin, F.2
-
5
-
-
0003680553
-
-
J. Wiley & Sons Inc. New York, NY
-
McGraw, G. and Felten, E. (1996, Java Security Hostile Applets, Holes and Antidotes, J. Wiley & Sons Inc., New York, NY.
-
(1996)
Java Security Hostile Applets, Holes and Antidotes
-
-
McGraw, G.1
Felten, E.2
-
8
-
-
3843117608
-
TclBlend: Blending Tcl and Java
-
Stanton, S. (1998, "TclBlend: Blending Tcl and Java", Dr. Dobb's Journal, Vol. 23 No. 2, pp. 50-4.
-
(1998)
Dr. Dobb's Journal
, vol.23
, Issue.2
, pp. 50-4
-
-
Stanton, S.1
-
11
-
-
84862399788
-
-
online
-
Sun Microsystems, (1997c, "Security in JDK 1.2", online, http://Java.sun.com/docs/books/tutorial/security 1./
-
(1997)
Security in JDK 1.2
-
-
-
12
-
-
0042748549
-
-
online
-
Sun Microsystems, (1997d, "Jacl and Tcl blend", online, http://sunscript.sun.com/Java/
-
(1997)
Jacl and Tcl Blend
-
-
-
13
-
-
84976781807
-
Reflections on trusting trust
-
Thompson, K. (1984, "Reflections on trusting trust", Communications of the ACM, Vol. 27 No. 8, pp. 761-3.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 761-3
-
-
Thompson, K.1
-
14
-
-
0031232912
-
Programming languages for mobile code
-
Thorn, T. (1997, "Programming languages for mobile code", ACM Computing Surveys, Vol. 29 No. 3, pp. 213-39.
-
(1997)
ACM Computing Surveys
, vol.29
, Issue.3
, pp. 213-39
-
-
Thorn, T.1
-
15
-
-
0542438609
-
-
Open Software Foundation Research Institute
-
Weiss, M., Johnson, A. and Kiniry, J. (1996, "Security features of Java and HotJava", Open Software Foundation Research Institute, online. htpp://user/cs.tu-berlin. e/∼majo/java/security.htm
-
(1996)
Security Features of Java and HotJava
-
-
Weiss, M.1
Johnson, A.2
Kiniry, J.3
|