[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Java security: hostile applets, holes&antidotesJanuary 1997
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-17842-2
Published:10 January 1997
Pages:
208
Reflects downloads up to 02 Mar 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Huai J, Sun H, Hu C, Zhu Y, Liu Y and Li J (2007). ROST, Future Generation Computer Systems, 23:6, (825-835), Online publication date: 1-Jul-2007.
  2. Rose E (2019). Lightweight Bytecode Verification, Journal of Automated Reasoning, 31:3-4, (303-334), Online publication date: 15-Jan-2004.
  3. ACM
    Beznosov K and Kruchten P Towards agile security assurance Proceedings of the 2004 workshop on New security paradigms, (47-54)
  4. Kemmerer R Cybersecurity Proceedings of the 25th International Conference on Software Engineering, (705-715)
  5. ACM
    Ioannidis S, Bellovin S and Smith J Sub-operating systems Proceedings of the 10th workshop on ACM SIGOPS European workshop, (108-115)
  6. ACM
    Ong T, Lim T, Lee B and Yeo C (2002). Unicorn, ACM SIGOPS Operating Systems Review, 36:2, (36-51), Online publication date: 1-Apr-2002.
  7. Fong P and Cameron R Proof linking Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium - Volume 1, (5-5)
  8. Malkhi D and Reiter M (2000). Secure Execution of Java Applets Using a Remote Playground, IEEE Transactions on Software Engineering, 26:12, (1197-1209), Online publication date: 1-Dec-2000.
  9. ACM
    Sirer E and Bershad B (2019). Using production grammars in software testing, ACM SIGPLAN Notices, 35:1, (1-13), Online publication date: 1-Jan-2000.
  10. ACM
    Doyon S and Debbabi M Verifying object initialization in the Java bytecode language Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, (821-830)
  11. ACM
    Hauswirth M, Kerer C and Kurmanowytsch R A secure execution framework for Java Proceedings of the 7th ACM conference on Computer and Communications Security, (43-52)
  12. Monden A, Iida H, Matsumoto K, Torii K and Inoue K A Practical Method for Watermarking Java Programs 24th International Computer Software and Applications Conference, (191-197)
  13. ACM
    Glew N and Morrisett G Type-safe linking and modular assembly language Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (250-261)
  14. ACM
    Beck J, Gefflaut A and Islam N MOCA Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access, (62-68)
  15. ACM
    Giuri L Role-based access control on the Web using Java Proceedings of the fourth ACM workshop on Role-based access control, (11-18)
  16. ACM
    Sirer E and Bershad B Using production grammars in software testing Proceedings of the 2nd conference on Domain-specific languages, (1-13)
  17. Montgomery M and Krishna K Secure object sharing in java card Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, (14-14)
  18. Sirer E and Bershad B Using production grammars in software testing Proceedings of the 2nd conference on Conference on Domain-Specific Languages - Volume 2, (1-1)
  19. ACM
    Sirer E, Grimm R, Gregory A and Bershad B (1999). Design and implementation of a distributed virtual machine for networked computers, ACM SIGOPS Operating Systems Review, 33:5, (202-216), Online publication date: 12-Dec-1999.
  20. ACM
    Sirer E, Grimm R, Gregory A and Bershad B Design and implementation of a distributed virtual machine for networked computers Proceedings of the seventeenth ACM symposium on Operating systems principles, (202-216)
  21. ACM
    Giuri L Role-based access control in Java Proceedings of the third ACM workshop on Role-based access control, (91-100)
  22. ACM
    Fong P and Cameron R Proof linking Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering, (222-230)
  23. ACM
    Fong P and Cameron R (2019). Proof linking, ACM SIGSOFT Software Engineering Notes, 23:6, (222-230), Online publication date: 1-Nov-1998.
  24. ACM
    Gritzalis S and Aggelis G (1998). Security issues surrounding programming languages for mobile code, ACM SIGOPS Operating Systems Review, 32:2, (16-32), Online publication date: 1-Apr-1998.
  25. Anupam V and Mayer A Security of web browser scripting languages Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (15-15)
  26. Devanbu P, Fong P and Stubblebine S Techniques for trusted software engineering Proceedings of the 20th international conference on Software engineering, (126-135)
  27. ACM
    Wallach D, Balfanz D, Dean D and Felten E (1997). Extensible security architectures for Java, ACM SIGOPS Operating Systems Review, 31:5, (116-128), Online publication date: 1-Dec-1997.
  28. ACM
    Wallach D, Balfanz D, Dean D and Felten E Extensible security architectures for Java Proceedings of the sixteenth ACM symposium on Operating systems principles, (116-128)
Contributors
  • Synopsys Incorporated
  • Princeton University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Skip Bibliometrics Section