Yellin, "Low Level Security in Java", http://java.sun.com/sfaq/verifier.html, pp 1-12, Dec. 1996.
. Bank, "Java Security", http://www-swiss.ai.mit.edu/.about.jbank/javapaper.html, pp 1-11, Dec. 1995.
. Thomas, "The Navigator Java Environment: Current Security Issues", http://developer.netscape.com/docs/manuals/javasecurity.html, pp. 1-3, Jan. 1996.
. Jaeger et al., "Implementation of a Discretionary Access Control Model for Scrip-based Systems", 8th IEEE Computer Security Foundations Workshop Proceedings, pp 70-84, Jun. 1995.
. Sandhu et al., "Role-Based Access Control: A Multi-Dimensional View", IEEE 10th Annual Computer Security Applications Conference Proceedings, pp 54-62, Dec. 1994.
. Anand et al., "A Flexible Security Model for Using Internet Content", IEEE The Sixteenth Symposium on Reliable Distributed Systems Proceedings, pp 89-96, Oct. 1997.
. Unknown, "HotJava(tm): The Security Story", http://java.sun.com/sfaq/may95/security.html, pp. 1-7, May 1995.
. Trent Jaeger, Aviel D. Rubin, Atul Prakash, "Building Systems That Flexibly Control Downloaded Executable Content", USENIX Association, 6th USENIX Security Symposium, pp. 131-148.
. Nayeem Islam, Rangachari Anand, Trent Jaeger and Josyula R. Rao, "A Flexible Security System For Using Internet Content", IEEE Software, Sep./Oct. 1997, pp. 52-59.. |