| Number | Name | Date | Kind |
|---|---|---|---|
| 4713753 | Boebert et al. | Dec 1987 | A |
| 5265221 | Miller | Nov 1993 | A |
| 5535375 | Eshel et al. | Jul 1996 | A |
| 5579222 | Bains et al. | Nov 1996 | A |
| 5677851 | Kingdon et al. | Oct 1997 | A |
| 5680452 | Shanton | Oct 1997 | A |
| 5706502 | Foley et al. | Jan 1998 | A |
| 5778222 | Herrick et al. | Jul 1998 | A |
| 5784560 | Kingdon et al. | Jul 1998 | A |
| 5802276 | Benantar et al. | Sep 1998 | A |
| 5802530 | Van Hoff | Sep 1998 | A |
| 5864676 | Beer et al. | Jan 1999 | A |
| 5987608 | Roskind | Nov 1999 | A |
| 6226654 | Van Hoff | May 2001 | B1 |
| 6345361 | Jerger et al. | Feb 2002 | B1 |
| Entry |
|---|
| Zukowski and Rohaly; “Fundamentals of Java Security” Nov. 1998, Mangelang Institute, Copyright Nov. 1998 Sun Microsystems Inc. <http://developer.java.sun.com/developer/onlineTraining/Security/Fundamentals/abstract.html>. |