-
1
-
-
65349130693
-
-
JSR 118 Expert Group, MIDP 2.0', Sun Specification. 2002.
-
JSR 118 Expert Group, MIDP 2.0', Sun Specification. 2002.
-
-
-
-
2
-
-
65349147116
-
-
OSGI Alliance. OSGi Service Platform, Core Specification Release 4.1, Draft, 2007.
-
OSGI Alliance. OSGi Service Platform, Core Specification Release 4.1, Draft, 2007.
-
-
-
-
4
-
-
0004345503
-
Introduction to Service-Oriented Programming (Rev 2.1), OpenWings
-
Whitepaper, 2001
-
Bieber G, Carpenter J. Introduction to Service-Oriented Programming (Rev 2.1), OpenWings Whitepaper, 2001.
-
-
-
Bieber, G.1
Carpenter, J.2
-
6
-
-
65349129486
-
-
OSGi Alliance, Hall RS. 'Bundle Repository', OSGi Alliance RFC 112, 2006.
-
OSGi Alliance, Hall RS. 'Bundle Repository', OSGi Alliance RFC 112, 2006.
-
-
-
-
9
-
-
65349086768
-
Java is not type-safe, AT&T Research
-
Whitepaper, 1997
-
Saraswat V. Java is not type-safe, AT&T Research Whitepaper, 1997.
-
-
-
Saraswat, V.1
-
11
-
-
0031634446
-
Security and dynamic class loading in Java: A formalisation
-
Chicago, IL, U.S.A
-
Jensen T, Metayer DL, Thorn T. Security and dynamic class loading in Java: A formalisation. IEEE International Conference on Computer Languages, Chicago, IL, U.S.A., 1998; 4-15.
-
(1998)
IEEE International Conference on Computer Languages
, pp. 4-15
-
-
Jensen, T.1
Metayer, D.L.2
Thorn, T.3
-
12
-
-
0029697575
-
Java Security: From HotJava to Netscape and beyond
-
IEEE Computer Society: Washington, DC, U.S.A
-
Dean D, Felten EW, Wallach DS. Java Security: From HotJava to Netscape and beyond. SP'96: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society: Washington, DC, U.S.A., 1996; 190.
-
(1996)
SP'96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 190
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
-
13
-
-
0003801299
-
-
2nd edn, Addison-Wesley: Reading, MA
-
Gong L, Ellison G, Dadgeforde M. Inside Java 2 Platform Security-Architecture, API Design, and Implementation (2nd edn). Addison-Wesley: Reading, MA, 2003.
-
(2003)
Inside Java 2 Platform Security-Architecture, API Design, and Implementation
-
-
Gong, L.1
Ellison, G.2
Dadgeforde, M.3
-
14
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development Kit 1.2
-
Monterey, CA, U.S.A
-
Gong L, Mueller M, Prafullchandra H, Schemers R. Going beyond the sandbox: An overview of the new security architecture in the Java development Kit 1.2. Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, CA, U.S.A., 1997.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
17
-
-
23844508070
-
-
May
-
Czajkowski G, Hahn S, Skinner G, Soper P, Bryce C. A resource management interface for the Java Platform, SMLI TR-2003-124, May 2003.
-
(2003)
A resource management interface for the Java Platform, SMLI TR-2003-124
-
-
Czajkowski, G.1
Hahn, S.2
Skinner, G.3
Soper, P.4
Bryce, C.5
-
22
-
-
65349120038
-
-
OSGi Alliance. RFC 18: Security Architecture Specification, OSGi Alliance Request for Comment, 2001.
-
OSGi Alliance. RFC 18: Security Architecture Specification, OSGi Alliance Request for Comment, 2001.
-
-
-
-
23
-
-
35248881593
-
Advanced OSGi Security Layer
-
Niagara Falls, Canada
-
Huang C-C, Wang P-L, Hou T-W. Advanced OSGi Security Layer. AINAW '07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol. 2, Niagara Falls, Canada, 2007; 518-523.
-
(2007)
AINAW '07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops
, vol.2
, pp. 518-523
-
-
Huang, C.-C.1
Wang, P.-L.2
Hou, T.-W.3
-
24
-
-
65349142574
-
-
Sun Microsystems, Inc. JavaTM Virtual Machine Profiler Interface (JVMPI). JavaTM 2 Platform Standard Edition 5.0-Overview. Available at: http://java.sun.com/j2se/1.5.0/docs/guide/jvmpi/, 2004.
-
Sun Microsystems, Inc. JavaTM Virtual Machine Profiler Interface (JVMPI). JavaTM 2 Platform Standard Edition 5.0-Overview. Available at: http://java.sun.com/j2se/1.5.0/docs/guide/jvmpi/, 2004.
-
-
-
-
25
-
-
65349193896
-
-
Sun Microsystems, Inc. JVMTM Tool Interface (JVM TI). JavaTM 2 Platform Standard Edition 5.0-Overview. Available at: http://java.sun.com/ j2se/1.5.0/docs/guide/jvmti/, 2004.
-
Sun Microsystems, Inc. JVMTM Tool Interface (JVM TI). JavaTM 2 Platform Standard Edition 5.0-Overview. Available at: http://java.sun.com/ j2se/1.5.0/docs/guide/jvmti/, 2004.
-
-
-
-
26
-
-
0003880013
-
-
Addison-Wesley: Reading, MA
-
Gamma E, Helm R, Johnson R, Vlissides J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley: Reading, MA, 1994.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
28
-
-
65349124208
-
-
Arvidsson J, Cormack A, Demchenko Y, Meijer J. TERENA's incident object description and exchange format requirements, IETF RFC 3067, 2001.
-
Arvidsson J, Cormack A, Demchenko Y, Meijer J. TERENA's incident object description and exchange format requirements, IETF RFC 3067, 2001.
-
-
-
-
33
-
-
41549118238
-
Java Components Vulnerabilities-An experimental classification targeted at the OSGi Platform'(RR-6231)
-
Technical Report INRIA, 84
-
Parrend P, Frenot S. Java Components Vulnerabilities-An experimental classification targeted at the OSGi Platform'(RR-6231). Technical Report INRIA, 2007; 84.
-
(2007)
-
-
Parrend, P.1
Frenot, S.2
-
36
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Oakland, CA, U.S.A
-
Lindqvist U, Jonsson E. How to systematically classify computer security intrusions. IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 1997; 154-163.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
37
-
-
0015603505
-
The concept of coverage and its effect on the reliability model of a repairable system
-
Arnold TF. The concept of coverage and its effect on the reliability model of a repairable system. IEEE Transactions on Computers 1973; 22:251-254.
-
(1973)
IEEE Transactions on Computers
, vol.22
, pp. 251-254
-
-
Arnold, T.F.1
|