Blocking Java Applets at the Firewall. Discussion about blocking hostile applets at firewalls.
5d77e9bbd24ea43c564b75db7a9698fb057843665c22a2b4a3a7970c78535e9c
Java is not type-safe.
7d73a4bf7b601e4155d31696f599b6ab14e49f2ee93ff8ae761ca056fff59345
The Security of Static Typing with Dynamic Linking.
0113243ed194973b320225cf70b90ee330858eea09539ef4a7a739c5c8983b72
A Comparison between Java and Active X Security.
b727e282eeab6c93a6ab0fc5dc264a2c5000803262bf98d83d83a28d2c378225
Foresight Computer Security Fact Forum. Discussion of the Java Security Model.
d37671c9e07f0185ab9588b392287687ec0c6f419ae111589a2e41105c2a2554
Defensive Java Virtual Machine Version 0.5 alpha Release. Built in ACL2.
923d0c210fb0b95a1401ef4399bd66906ef94c5d9e4a15ea88925bdd27370025
Experience with Secure Multi-Processing in Java.
6b2399049d80b231f1ebff6b737cf10d9ad96fd27bba7950de67f2186f8d621e
Software Assurance for Security.
96780e992d9a103c5547758d5c309d02324edb269ddd51933f19883cc0752881
One of the first papers presented on Java Security.
f8dc39dc8ff5844294998d078c0411afec262822c59ecdecf58bc963436ed142
Work on the Java Type System.
905d2a3caa5d56f8aef840612acd90730d5a7195b8320b80af3cc36b9f0ca289
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
82ee3fa459d723dfe44487556ed107ec77554ab3a1e03fc8ed785edecbe61063
Implementing Protection Domains in the Java Development Kit 1.2.
62a64f8fa36c4307eaffcbb13d04ab6ad99c0b1b4405b057eab300ec787786ad
Java Security: Weaknesses and Solutions. Early paper on Java security and problems in the VM.
7f323cac7f4d8c3f560fb458789be16f7e26a5745cb63bb0969ec64254ff4200
Mobile Code Bibliography. A collection of mobile code publications.
ff2014830bd1405ed05fb4c2c0018c99b1eb9a12a8d61f431314133aade13b24
Security Breaches in the JDK 1.1 beta 2 security API.
cbc6054b0828c31ee8555a26e7f57e83a4991f121da7ffdcb34b90345e2fa9fe
Java Security: From HotJava to Netscape and Beyond. A classic paper on the security of Java.
b85f385f8193474766ce1356143a6c567256b54db47b595733709d3f9289c71c
Extensible Security Architectures for Java.
25a72c5f0c88af4942f78a621bbd75803c94f3c64126ef142fa2dbbce00043d9
A Type System for Java Bytecode Subroutines.
94b8f3b85c39948c444b417306a68857d124d0b9525e7246490eb11ff08cb363
The Java Security Reference Model for 1.0.2.
1f1978ef69e4272a0d06a49061671a64929e3b4590fb5a55063a1d115fb819f8
Trust Management on the World Wide Web.
5f88e3f3d6bc4cf2339a5ad58453e6dbece52ae604ac88558d513e2add732313
Low Level Security in Java. The Java(tm) language allows Java-compatible Web browsers to download code fragments dynamically and then to execute those code fragments locally. However, users must be wary of executing any code that comes from untrusted sources or that passes through an insecure network. This paper presents the details of the lowest-levels of the Java security mechanism. Before any downloaded code is executed, it is scanned and verified to ensure that it conforms to the specifications of the virtual machine.
cd6471f978c21f4fbdeadac61473d22b77fb13d50682cbfef3730d1a41149adb
Software Assurance for Security.
18b4b113c89cd59d18b65aac8b61c2b0b3c42ad43fabb3e932d965a233986eae
This White Paper gives an introduction to computer security and its significance for businesses, followed by an alphabetical guide to common security measures and threats.
3cbb91d4ad1559a716fb43f916d733648d6882152999943a6683bfc8dd87a156
Codes, Keys, and Conflicts: Issues in US Crypto Policy: A report of a special panel of the ACM (Association for Computing Machinery) US Public Policy Committee.
e40d79fba5b578f7df4b941686666a68d40a9153fe087dce1a467be7c604fdbb
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise: An extension of the protocol described in nekeps that removes the requirement that the host store passwords in cleartext .
501401b51463c5696021410a8329a152582020b94dcba5e0425bbb263f7bfca9