Gong, 2002 - Google Patents
Java 2 platform security architectureGong, 2002
View PDF- Document ID
- 14556863232951730481
- Author
- Gong L
- Publication year
- Publication venue
- Sun Microsystems (http://java. sun. com/j2se/1. 4. 2/docs/guide/security/spec/security-spec. doc. html)
External Links
Snippet
Java™ 2 Platform Security Architecture Page 1 Java™ 2 Platform Security Architecture Author:
Li Gong (li.gong@sun.com) Date: October 2, 1998 Version 1.0 This document gives an
overview of the motivation of the major security features that are being implemented for the …
- 238000011068 load 0 description 31
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gong | Java security architecture (JDK 1.2) | |
Gong | Java 2 platform security architecture | |
Jaeger | Operating system security | |
Wallach et al. | Extensible security architectures for Java | |
Oaks | Java security: writing and deploying secure applications | |
US6389540B1 (en) | Stack based access control using code and executor identifiers | |
Gong et al. | Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2 | |
US8782807B2 (en) | System and method for authenticating code executing on computer system | |
Long et al. | Java coding guidelines: 75 recommendations for reliable and secure programs | |
Pistoia et al. | Java 2 network security | |
Dean et al. | Java security: Web browsers and beyond | |
US7734918B2 (en) | Preventing rogue implementations of a security-sensitive class interface | |
Krishnamurthy et al. | Fine-grained privilege separation for web applications | |
Zhang et al. | SecureBus: towards application-transparent trusted computing with mandatory access control | |
Bauer et al. | Mechanisms for secure modular programming in Java | |
Koved et al. | The evolution of Java security | |
Paul et al. | Comparing java and. net security: Lessons learned and missed | |
Anderson | Java™ access control mechanisms | |
Gritzalis et al. | Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl | |
Zhang et al. | Towards remote policy enforcement for runtime protection of mobile code using trusted computing | |
Hauswirth et al. | A flexible and extensible security framework for Java code | |
Vijayakumar et al. | The right files at the right time | |
Jones et al. | Visual C# 2005 Recipes: A Problem-Solution Approach | |
Murison | .NET Framework Security | |
Gritzalis et al. | Architectures for secure portable executable content |