exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 161 RSS Feed

Files Date: 1999-10-01 to 1999-10-02

96-026-java-firewalls.ps.Z
Posted Oct 1, 1999
Authored by Davin Martin

Blocking Java Applets at the Firewall. Discussion about blocking hostile applets at firewalls.

tags | paper, java
SHA-256 | 5d77e9bbd24ea43c564b75db7a9698fb057843665c22a2b4a3a7970c78535e9c
bug.html
Posted Oct 1, 1999
Authored by Vijay Saraswat

Java is not type-safe.

tags | paper, java
SHA-256 | 7d73a4bf7b601e4155d31696f599b6ab14e49f2ee93ff8ae761ca056fff59345
ccs4.html
Posted Oct 1, 1999
Authored by Drew Dean

The Security of Static Typing with Dynamic Linking.

tags | paper, java
SHA-256 | 0113243ed194973b320225cf70b90ee330858eea09539ef4a7a739c5c8983b72
compsec97.html
Posted Oct 1, 1999
Authored by David Hopwood

A Comparison between Java and Active X Security.

tags | paper, java, activex
SHA-256 | b727e282eeab6c93a6ab0fc5dc264a2c5000803262bf98d83d83a28d2c378225
CSFactForum.html
Posted Oct 1, 1999

Foresight Computer Security Fact Forum. Discussion of the Java Security Model.

tags | paper, java
SHA-256 | d37671c9e07f0185ab9588b392287687ec0c6f419ae111589a2e41105c2a2554
djvm.html
Posted Oct 1, 1999

Defensive Java Virtual Machine Version 0.5 alpha Release. Built in ACL2.

tags | paper, java
SHA-256 | 923d0c210fb0b95a1401ef4399bd66906ef94c5d9e4a15ea88925bdd27370025
icdcs.html
Posted Oct 1, 1999
Authored by Dirk Balfanz

Experience with Secure Multi-Processing in Java.

tags | paper, java
SHA-256 | 6b2399049d80b231f1ebff6b737cf10d9ad96fd27bba7950de67f2186f8d621e
ieee-computer-secass.pdf
Posted Oct 1, 1999

Software Assurance for Security.

tags | paper, java
SHA-256 | 96780e992d9a103c5547758d5c309d02324edb269ddd51933f19883cc0752881
javapaper.html
Posted Oct 1, 1999
Authored by Joseph Bank

One of the first papers presented on Java Security.

tags | paper, java
SHA-256 | f8dc39dc8ff5844294998d078c0411afec262822c59ecdecf58bc963436ed142
JavaW.html
Posted Oct 1, 1999
Authored by Sophia Drossopoulou

Work on the Java Type System.

tags | paper, java
SHA-256 | 905d2a3caa5d56f8aef840612acd90730d5a7195b8320b80af3cc36b9f0ca289
jdk12arch.ps.gz
Posted Oct 1, 1999

Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2

tags | paper, java
SHA-256 | 82ee3fa459d723dfe44487556ed107ec77554ab3a1e03fc8ed785edecbe61063
jdk12impl.ps.gz
Posted Oct 1, 1999
Authored by Gong, Schemers

Implementing Protection Domains in the Java Development Kit 1.2.

tags | paper, java
SHA-256 | 62a64f8fa36c4307eaffcbb13d04ab6ad99c0b1b4405b057eab300ec787786ad
JS_pap2.html
Posted Oct 1, 1999

Java Security: Weaknesses and Solutions. Early paper on Java security and problems in the VM.

tags | paper, java
SHA-256 | 7f323cac7f4d8c3f560fb458789be16f7e26a5745cb63bb0969ec64254ff4200
mobile-abs.bib.html
Posted Oct 1, 1999

Mobile Code Bibliography. A collection of mobile code publications.

tags | paper, java
SHA-256 | ff2014830bd1405ed05fb4c2c0018c99b1eb9a12a8d61f431314133aade13b24
SecHole.html
Posted Oct 1, 1999
Authored by Jean-Paul Billon

Security Breaches in the JDK 1.1 beta 2 security API.

tags | paper, java
SHA-256 | cbc6054b0828c31ee8555a26e7f57e83a4991f121da7ffdcb34b90345e2fa9fe
secure96.html
Posted Oct 1, 1999
Authored by Princeton Security Team

Java Security: From HotJava to Netscape and Beyond. A classic paper on the security of Java.

tags | paper, java
SHA-256 | b85f385f8193474766ce1356143a6c567256b54db47b595733709d3f9289c71c
sosp97.html
Posted Oct 1, 1999
Authored by The Princeton Security Group

Extensible Security Architectures for Java.

tags | paper, java
SHA-256 | 25a72c5f0c88af4942f78a621bbd75803c94f3c64126ef142fa2dbbce00043d9
src-rr-158.html
Posted Oct 1, 1999
Authored by Stata, Abadi

A Type System for Java Bytecode Subroutines.

tags | paper, java
SHA-256 | 94b8f3b85c39948c444b417306a68857d124d0b9525e7246490eb11ff08cb363
SRM.html
Posted Oct 1, 1999

The Java Security Reference Model for 1.0.2.

tags | paper, java
SHA-256 | 1f1978ef69e4272a0d06a49061671a64929e3b4590fb5a55063a1d115fb819f8
trust.html
Posted Oct 1, 1999
Authored by Khare, Rifkin

Trust Management on the World Wide Web.

tags | paper, java, web
SHA-256 | 5f88e3f3d6bc4cf2339a5ad58453e6dbece52ae604ac88558d513e2add732313
verifier.html
Posted Oct 1, 1999
Authored by Frank Yellin

Low Level Security in Java. The Java(tm) language allows Java-compatible Web browsers to download code fragments dynamically and then to execute those code fragments locally. However, users must be wary of executing any code that comes from untrusted sources or that passes through an insecure network. This paper presents the details of the lowest-levels of the Java security mechanism. Before any downloaded code is executed, it is scanned and verified to ensure that it conforms to the specifications of the virtual machine.

tags | paper, java, web
SHA-256 | cd6471f978c21f4fbdeadac61473d22b77fb13d50682cbfef3730d1a41149adb
w6gei.htm
Posted Oct 1, 1999

Software Assurance for Security.

tags | paper, java
SHA-256 | 18b4b113c89cd59d18b65aac8b61c2b0b3c42ad43fabb3e932d965a233986eae
abc.pdf
Posted Oct 1, 1999
Authored by Paul Ducklin | Site sophos.com

This White Paper gives an introduction to computer security and its significance for businesses, followed by an alphabetical guide to common security measures and threats.

tags | paper
SHA-256 | 3cbb91d4ad1559a716fb43f916d733648d6882152999943a6683bfc8dd87a156
acmcrypt.ps
Posted Oct 1, 1999

Codes, Keys, and Conflicts: Issues in US Crypto Policy: A report of a special panel of the ACM (Association for Computing Machinery) US Public Policy Committee.

tags | paper, cryptography
SHA-256 | e40d79fba5b578f7df4b941686666a68d40a9153fe087dce1a467be7c604fdbb
aeke.ps
Posted Oct 1, 1999

Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise: An extension of the protocol described in nekeps that removes the requirement that the host store passwords in cleartext .

tags | paper, protocol
SHA-256 | 501401b51463c5696021410a8329a152582020b94dcba5e0425bbb263f7bfca9
Page 1 of 7
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close