Java security: from HotJava to Netscape and beyond

作者: E.W. Felten , D. Dean , D.S. Wallach

DOI: 10.5555/525080.884266

关键词: World Wide WebJavaJava appletWeb applicationComputer scienceReal time JavaHigh-level programming languageServerJava annotationBytecode

摘要: … a signiJicant zxmber of flaws which compromise their security. These .%zws arise for several … and the security needs of their users, and we suggest how both might be accommodated. …

参考文章(23)
Bjarne Stroustrup, The C++ programming language (2nd ed.) Addison-Wesley Longman Publishing Co., Inc.. ,(1991)
Antony Courtney, Phantom: an interpreted language for distributed programming COOTS'95 Proceedings of the USENIX Conference on Object-Oriented Technologies on USENIX Conference on Object-Oriented Technologies (COOTS). pp. 7- 7 ,(1995)
Nathaniel S. Borenstein, EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications. pp. 389- 402 ,(1994)
Henry M. Levy, Capability-Based Computer Systems ,(1984)
L Simon, Peyton Jones, The implementation of functional programming languages Prentice-Hall International. ,(1987)
Steven M. Bellovin, Aviel D. Rubin, William R. Cheswick, Firewalls and Internet Security: Repelling the Wily Hacker ,(2003)
Mads Tofte, Mads Tofte, Robert Harper, Robin Milner, The Definition of Standard ML ,(1990)
Ames, Gasser, Schell, Security Kernel Design and Implementation: An Introduction IEEE Computer. ,vol. 16, pp. 14- 22 ,(1983) , 10.1109/MC.1983.1654439