[go: up one dir, main page]

Gong, 2002 - Google Patents

Java 2 platform security architecture

Gong, 2002

View PDF
Document ID
14556863232951730481
Author
Gong L
Publication year
Publication venue
Sun Microsystems (http://java. sun. com/j2se/1. 4. 2/docs/guide/security/spec/security-spec. doc. html)

External Links

Snippet

Java™ 2 Platform Security Architecture Page 1 Java™ 2 Platform Security Architecture Author: Li Gong (li.gong@sun.com) Date: October 2, 1998 Version 1.0 This document gives an overview of the motivation of the major security features that are being implemented for the …
Continue reading at distfiles.freebsd.pl (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Gong Java security architecture (JDK 1.2)
Gong Java 2 platform security architecture
Jaeger Operating system security
Wallach et al. Extensible security architectures for Java
Oaks Java security: writing and deploying secure applications
US6389540B1 (en) Stack based access control using code and executor identifiers
Gong et al. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
US8782807B2 (en) System and method for authenticating code executing on computer system
Long et al. Java coding guidelines: 75 recommendations for reliable and secure programs
Pistoia et al. Java 2 network security
Dean et al. Java security: Web browsers and beyond
US7734918B2 (en) Preventing rogue implementations of a security-sensitive class interface
Krishnamurthy et al. Fine-grained privilege separation for web applications
Zhang et al. SecureBus: towards application-transparent trusted computing with mandatory access control
Bauer et al. Mechanisms for secure modular programming in Java
Koved et al. The evolution of Java security
Paul et al. Comparing java and. net security: Lessons learned and missed
Anderson Java™ access control mechanisms
Gritzalis et al. Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl
Zhang et al. Towards remote policy enforcement for runtime protection of mobile code using trusted computing
Hauswirth et al. A flexible and extensible security framework for Java code
Vijayakumar et al. The right files at the right time
Jones et al. Visual C# 2005 Recipes: A Problem-Solution Approach
Murison .NET Framework Security
Gritzalis et al. Architectures for secure portable executable content