Verifying object initialization in the Java bytecode language
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 2
Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
Multimedia Tools and Applications
Java Based E-Commerce middleware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Security for Distributed E-Service Composition
TES '01 Proceedings of the Second International Workshop on Technologies for E-Services
Data Security for Distributed Meeting Systems
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
ObjectGlobe: Ubiquitous query processing on the Internet
The VLDB Journal — The International Journal on Very Large Data Bases
InfoGram: A Grid Service that Supports Both Information Queries and Job Execution
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Anomaly intrusion detection in dynamic execution environments
Proceedings of the 2002 workshop on New security paradigms
Secret key distribution protocol using public key cryptography
Journal of Computing Sciences in Colleges
Hardware support for user-access control on an object-oriented processor
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Secure Network Management Within an Open-Source Mobile Agent Framework
Journal of Network and Systems Management
Design and implementation of secure e-mail system using elliptic curve cryptosystem
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
The evolution of Java security
IBM Systems Journal
Memory safety without garbage collection for embedded applications
ACM Transactions on Embedded Computing Systems (TECS)
An example oriented on-line Java tutorial for university students
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Formal specification and analysis of JAAS framework
Proceedings of the 2006 international workshop on Software engineering for secure systems
The management of users, roles, and permissions in JDOSecure
PPPJ '06 Proceedings of the 4th international symposium on Principles and practice of programming in Java
Web browser accessibility using open source software
W4A '07 Proceedings of the 2007 international cross-disciplinary conference on Web accessibility (W4A)
FIE'09 Proceedings of the 39th IEEE international conference on Frontiers in education conference
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Retaining sandbox containment despite bugs in privileged memory-safe code
Proceedings of the 17th ACM conference on Computer and communications security
A multi-tier framework for securing e-transactions in e-government systems of Saudi Arabia
International Journal of Electronic Finance
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Modeling class loaders in Java PathFinder version 7
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
This essential Java 2 book covers Java's security mechanisms and teaches you how to work with them. It discusses class loaders, security managers, access lists, digital signatures, and authentication and shows how to use these to create and enforce your own security policy.