Java security: from HotJava to Netscape and beyond
- 23 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 17, 190-200
- https://doi.org/10.1109/secpri.1996.502681
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Reducing timing channels with fuzzy timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Limiting the Damage Potential of Discretionary Trojan HorsesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Security Kernel Design and Implementation: An IntroductionComputer, 1983
- Programming in Modula-2Published by Springer Nature ,1983
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Formal Models for Computer SecurityACM Computing Surveys, 1981
- Experience with processes and monitors in MesaCommunications of the ACM, 1980
- ProtectionACM SIGOPS Operating Systems Review, 1974