ARTICLE |
PUBLICATION |
LINK |
Java 2 security and stack inspection |
Gamelan.com 05/12/99. |
Read It |
Java 2’s Verifier becomes confused by German student’s security attack |
Java World 04/99. |
Read It |
Software Assurance for Security |
IEEE Computer 04/99. |
Read It |
IEEE Internet Computing Online: Mobile Code Security |
IEEE Internet Computing 11-12/98. |
Read It |
Twelve Rules for Developing More Secure Java Code |
Java World 12/98. |
Read It |
Third-party Java Security Vendors: Solutions or Snake Oil? |
Java Report 12/98. |
RIP |
Privileged code in Java: Why the API changed from JDK1.2beta3 to JDK1.2beta4 |
developer.com 08/31/98. |
RIP |
New Issues in Java Security |
Component Strategies 07-08/98. |
Read It |
Smart cards, Java cards and security |
developer.com 01/19/98. |
Read It |
Don’t push me: the security implications of push |
developer.com 12/30/97. |
Read It |
Sandboxes and signatures, Part 2: How to sign code for Netscape Communicator |
developer.com 10/14/97. |
Read It |
Sandboxes and signatures, Part 1: The future of executable content |
developer.com 10/7/97. |
Read It |
Understanding the keys to Java security: the sandbox and authentication |
JavaWorld 2(5), May 1997. |
Read It |
Avoiding Hostile Applets: How to minimize the risks of executable content |
Byte Magazine, May, 1997, pages 89-92. |
Read It |
Webware Security, Inside Risks |
Communications of the ACM, 40(4), page 130. April 1997. |
Read It |
Is your browser a blabbermouth? Are your ports being scanned? |
JavaWorld 2(3), March 1997. |
Read It |
The dark side of executable content |
NetscapeWorld 2(2), February 1997. |
Read It |
Java Security: Hostile Applets |
Java Report 2(2), February 1997. |
RIP |
Plugs for Java’s Security Holes |
a sidebar for the cover story of Byte Magazine, January, 1997, page 76. |
RIP |
Java Security and Type Safety |
Byte Magazine, January, 1997, pages 63-64. |
Read It |