咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 14 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 20 篇 java security
  • 5 篇 security
  • 3 篇 alloy
  • 3 篇 lightweight mode...
  • 2 篇 languages
  • 2 篇 and software ass...
  • 2 篇 invocation graph
  • 2 篇 static analysis
  • 2 篇 access rights
  • 2 篇 data flow analys...
  • 2 篇 call graph
  • 2 篇 web security
  • 2 篇 virtualization
  • 2 篇 jvm bytecode
  • 1 篇 exploits
  • 1 篇 safety requireme...
  • 1 篇 cascaded
  • 1 篇 security require...
  • 1 篇 access control
  • 1 篇 osgi

机构

  • 3 篇 boston univ dept...
  • 2 篇 ibm corp thomas ...
  • 1 篇 facebook 1 hacke...
  • 1 篇 pace univ ny 100...
  • 1 篇 fraunhofer iem p...
  • 1 篇 tech univ darmst...
  • 1 篇 korea adv inst s...
  • 1 篇 helwan univ fac ...
  • 1 篇 penn state univ ...
  • 1 篇 univ laval dept ...
  • 1 篇 pace university
  • 1 篇 oracle 4180 netw...
  • 1 篇 paderborn univ p...
  • 1 篇 fraunhofer iem h...
  • 1 篇 department of co...
  • 1 篇 univ paderborn p...
  • 1 篇 fortify software...
  • 1 篇 univ milan milan
  • 1 篇 univ virginia de...
  • 1 篇 suny stony brook...

作者

  • 3 篇 reynolds mark c.
  • 2 篇 kershenbaum a
  • 2 篇 bodden eric
  • 2 篇 pistoia m
  • 2 篇 koved l
  • 1 篇 brooks r
  • 1 篇 piskachev goran
  • 1 篇 lisa nguyen quan...
  • 1 篇 wang luyang
  • 1 篇 vignati edoardo
  • 1 篇 chen li-chiou
  • 1 篇 kandemir m
  • 1 篇 chiueh tc
  • 1 篇 nasr mona m.
  • 1 篇 bartel alexandre
  • 1 篇 irwin mj
  • 1 篇 jean sebastien
  • 1 篇 bruschi danilo
  • 1 篇 beznosov konstan...
  • 1 篇 chess brian

语言

  • 19 篇 英文
  • 1 篇 其他
检索条件"主题词=Java Security"
20 条 记 录,以下是1-10 订阅
排序:
Effective Web and java security Education with the SWEET Course Modules/Resources
Effective Web and Java Security Education with the SWEET Cou...
收藏 引用
SSITE International Conference on Computers and Advanced Technology in Education (ICCATE 2011)
作者: Tao, Lixin Chen, Li-Chiou Pace Univ New York NY 10038 USA
We have developed a complete set of open-source tutorials and hands-on lab exercises, called Secure WEb dEvelopment Teaching (SWEET), to introduce security concepts and practices for web and java application developme... 详细信息
来源: 评论
End-to-End java security Performance Enhancements for Oracle SPARC Servers  16
End-to-End Java Security Performance Enhancements for Oracle...
收藏 引用
7th ACM/SPEC International Conference on Performance Engineering (ICPE)
作者: Wang, Luyang Bhattacharya, Pallab Chen, Yao-Min Joshi, Shrinivas Cheng, James Oracle 4180 Network Circle Santa Clara CA 95054 USA Facebook 1 Hacker Way Menlo Pk CA 94025 USA
In this paper we investigate the performance of cryptographic operations, when used in java applications. We demonstrate the advantage of using built-in hardware accelerator for cryptographic operations on SPARC serve... 详细信息
来源: 评论
Comparing java and .NET security: Lessons learned and missed
收藏 引用
COMPUTERS & security 2006年 第5期25卷 338-350页
作者: Paul, Nathanael Evans, David Univ Virginia Dept Comp Sci Charlottesville VA 22903 USA
Many systems execute untrusted programs in virtual machines (VMS) to mediate their access to system resources. Sun introduced the java VM in 1995, primarily intended as a lightweight platform for executing untrusted c... 详细信息
来源: 评论
Effective Web and java security Education with the SWEET Course Modules/Resources
Effective Web and Java Security Education with the SWEET Cou...
收藏 引用
2011 SSITE International Conference on Computers and Advanced Technology in Education(ICCATE 2011)
作者: Lixin Tao Li-Chiou Chen Pace University
We have developed a complete set of open-source tutorials and hands-on lab exercises, called Secure WEb d Evelopment Teaching(SWEET), to introduce security concepts and practices for web and java application developme... 详细信息
来源: 评论
Lightweight Modeling of java Virtual Machine security Constraints
Lightweight Modeling of Java Virtual Machine Security Constr...
收藏 引用
2nd International Conference on Abstract State Machines, B and Z
作者: Reynolds, Mark C. Boston Univ Dept Comp Sci Boston MA 02215 USA
The java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in java, particularly in the component known as the Bytecode... 详细信息
来源: 评论
Spout: A transparent proxy for safe execution of java applets
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2002年 第7期20卷 1426-1433页
作者: Chiueh, TC Sankaran, H Neogi, A SUNY Stony Brook Dept Comp Sci Stony Brook NY 11794 USA Nortel Networks Ltd Routing Grp Wilmington MA USA
The advent of executable contents such as java applets exposes World Wide Web (WWW) users to a new class of attacks that were not possible before. Despite an array of security checking, detection, and enforcement mech... 详细信息
来源: 评论
On object initialization in the java bytecode
收藏 引用
COMPUTER COMMUNICATIONS 2000年 第17期23卷 1594-1605页
作者: Doyon, S Debbabi, M Univ Laval Dept Comp Sci LSFM Res Grp St Foy PQ G1K 7P4 Canada
java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted java programs can be statically analyzed and validat... 详细信息
来源: 评论
security for the rest of us: An industry perspective on the secure-software challenge
收藏 引用
IEEE SOFTWARE 2008年 第1期25卷 10-12页
作者: Beznosov, Konstantin Chess, Brian Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada Fortify Software San Mateo CA 94404 USA
While security was once a specialty of interest to only a few programmers, it\'\'s now a critical topic for almost all software engineers, project managers, and decision makers. Getting security right is hard ... 详细信息
来源: 评论
Modeling the java Bytecode Verifier
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2013年 第3期78卷 327-342页
作者: Reynolds, Mark C. Boston Univ Dept Comp Sci Boston MA 02215 USA
The java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in java, particularly in the Bytecode Verifier, a critical c... 详细信息
来源: 评论
A Proposed Paradigm for Tracing the Effect of security Threats in Various Mobile Agent Systems  5
A Proposed Paradigm for Tracing the Effect of Security Threa...
收藏 引用
5th National Symposium on Information Technology - Towards New Smart World (NSITNSW)
作者: Nasr, Mona M. Helwan Univ Fac Comp & Informat Qism Helwan Cairo Governora Egypt
Many people consider that security is one of the complexes problems for practical use of mobile agents that move around the networks and do their tasks. This complexity is due mainly to the size of the problem, moreov... 详细信息
来源: 评论