Yellin, "Low Level Security in Java", http://java.sun.com/sfaq/verifier.html, pp 1-12, Dec. 1996. |
Bank, "Java Security", http://www-swiss.ai.mit.edu/.about.jbank/javapaper.html, pp 1-11, Dec. 1995. |
Thomas, "The Navigator Java Environment: Current Security Issues", http://developer.netscape.com/docs/manuals/javasecurity.html, pp. 1-3, Jan. 1996. |
Jaeger et al., "Implementation of a Discretionary Access Control Model for Scrip-based Systems", 8th IEEE Computer Security Foundations Workshop Proceedings, pp 70-84, Jun. 1995. |
Sandhu et al., "Role-Based Access Control: A Multi-Dimensional View", IEEE 10th Annual Computer Security Applications Conference Proceedings, pp 54-62, Dec. 1994. |
Anand et al., "A Flexible Security Model for Using Internet Content", IEEE The Sixteenth Symposium on Reliable Distributed Systems Proceedings, pp 89-96, Oct. 1997. |
Unknown, "HotJava(tm): The Security Story", http://java.sun.com/sfaq/may95/security.html, pp. 1-7, May 1995. |
Trent Jaeger, Aviel D. Rubin, Atul Prakash, "Building Systems That Flexibly Control Downloaded Executable Content", USENIX Association, 6th USENIX Security Symposium, pp. 131-148. |
Nayeem Islam, Rangachari Anand, Trent Jaeger and Josyula R. Rao, "A Flexible Security System For Using Internet Content", IEEE Software, Sep./Oct. 1997, pp. 52-59. |