Java security: Web browsers and beyond

作者: Drew Dean , Edward W Felten , Dan S Wallach , Dirk Balfanz , PJ Denning

DOI:

关键词:

摘要:

参考文章(28)
Antony Courtney, Phantom: an interpreted language for distributed programming COOTS'95 Proceedings of the USENIX Conference on Object-Oriented Technologies on USENIX Conference on Object-Oriented Technologies (COOTS). pp. 7- 7 ,(1995)
Nathaniel S. Borenstein, EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications. pp. 389- 402 ,(1994)
A White, Henry McGilton, James Gosling, The JavaTM Language Environment ,(1998)
Frank Yellin, Tim Lindholm, The Java Virtual Machine Specification ,(1996)
Henry M. Levy, Capability-Based Computer Systems ,(1984)
Thomas Kistler, Michael Franz, A Tree-Based Alternative to Java Byte-Codes International Journal of Parallel Programming. ,vol. 27, pp. 21- 33 ,(1999) , 10.1023/A:1018740018601
L Simon, Peyton Jones, The implementation of functional programming languages Prentice-Hall International. ,(1987)
Steven M. Bellovin, Using the domain name system for system break-ins usenix security symposium. pp. 18- 18 ,(1995) , 10.7916/D8ZS338M
Bill Joy, Guy Steele, James Gosling, Gilad Bracha, None, The Java Language Specification ,(1996)