Java']Java security: Present and near future

被引:30
|
作者
Gong, L
机构
[1] JavaSoft, Stanford Research Institute
[2] JavaSoft, MS UCUP02-102, Mountain View, CA 94043-1100
关键词
D O I
10.1109/40.591650
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The global system infrastructure is evolving rapidly. Java's security model must keep pace.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 50 条
  • [21] A security infrastructure for distributed Java']Java applications
    Balfanz, D
    Dean, D
    Spreitzer, M
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 15 - 26
  • [22] Developing a security Typed Java']Java Servlet
    Hassan, Doaa
    El-Kassas, Sherif
    Ziedan, Ibrabim
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 215 - 220
  • [23] Java']Java for mobile devices: A security study
    Debbabi, M
    Saleh, M
    Talhi, C
    Zhioua, S
    21st Annual Computer Security Applications Conference, Proceedings, 2005, : 210 - 219
  • [24] A security framework for reflective Java']Java applications
    Caromel, D
    Vayssière, J
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (09): : 821 - 846
  • [25] New security architectural directions for Java']Java
    Li, G
    IEEE COMPCON 97, PROCEEDINGS, 1997, : 97 - 102
  • [26] Coarse grained Java']Java security policies
    Jensen, T
    Le Métayer, D
    Thorn, T
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 296 - 296
  • [27] Expanding and extending the security features of Java']Java
    Mehta, NV
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 159 - 172
  • [28] Analysis of JAVA']JAVA security and hostile applets
    Brunnstein, K
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 293 - 295
  • [29] Security Monitor Inlining for Multithreaded Java']Java
    Dam, Mads
    Jacobs, Bart
    Lundblad, Andreas
    Piessens, Frank
    ECOOP 2009 - OBJECT-ORIENTED PROGRAMMING, 2009, 5653 : 546 - +
  • [30] Developing a Security Typed Java']Java Servlet
    Hassan, Doaa
    El-Kassas, Sherif
    Ziedan, Ibrahim
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 161 - 169