Building a secure computer system
Building a secure computer system
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
Computer related risks
Protection and the control of information sharing in multics
Communications of the ACM
Java Virtual Machine Specification
Java Virtual Machine Specification
The Java Language Specification
The Java Language Specification
Dependability: Basic Concepts and Terminology
Dependability: Basic Concepts and Terminology
ACM SIGOPS Operating Systems Review
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Protection in programmed systems.
Protection in programmed systems.
Using code mobility to create ubiquitous and active augmented reality in mobile computing
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Security architecture for component-based operating systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Application isolation in the Java Virtual Machine
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
ACM Transactions on Information and System Security (TISSEC)
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Access control in configurable systems
Secure Internet programming
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
Increasing Application Accessibility Through Java
IEEE Internet Computing
IEEE Internet Computing
Providing Fine-grained Access Control for Java Programs
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Runtime Support for Type-Safe Dynamic Java Classes
ECOOP '00 Proceedings of the 14th European Conference on Object-Oriented Programming
Lana: An Approach to Programming Autonomous Systems
ECOOP '02 Proceedings of the 16th European Conference on Object-Oriented Programming
Pharos, a Collaborative Infrastructure for Web Knowledge Sharing
ECDL '99 Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries
A Contract-Based Approach of Resource-Constrained Software Deployment
CD '02 Proceedings of the IFIP/ACM Working Conference on Component Deployment
Signing, Sealing, and Guarding Java Objects
Mobile Agents and Security
JASON: an open platform for discovering and hosting applications in ad hoc networks
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
A review of information security issues and respective research contributions
ACM SIGMIS Database
Secure coprocessor integration with kerberos V5
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Expanding and extending the security features of java
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Implementing multiple protection domains in java
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Security mechanisms for the MAP agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
Java security architecture revisited
Communications of the ACM
Java Security Architecture Revisited
Queue - Programming Languages
Logical attestation: an authorization architecture for trustworthy computing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Parallel and distributed components with java
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Using mobile agents to implement flexible network management strategies
Computer Communications
Security-by-contract: toward a semantics for digital signatures on mobile code
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.02 |
This paper gives an overview of the basics of Java-related security issues, and outlines the technical direction of Java in terms of the security architecture and desirable features. This document is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.