Java Reference
In-Depth Information
[Long 2012] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and
David Svoboda. The CERT ® Oracle ® Secure Coding Standard for Java . Boston, MA:
Addison-Wesley (2012).
[Manion 2013] Manion, Art. “Anatomy of Java Exploits,” CERT/CC Blog (2013).
www.cert.org/blogs/certcc/2013/01/anatomy_of_java_exploits.html
[McGraw 1999] McGraw,Gary,andEdFelten. Securing Java: Getting Down to Business
with Mobile Code, Second Edition . New York, NY: Wiley (1999).
[Mettler 2010] Mettler,Adrian,andDavidWagner.“ClassPropertiesforSecurityReview
inanObject-CapabilitySubsetofJava.” Proceedings of the 5th ACM SIGPLAN Workshop
on Programming Languages and Analysis for Security (PLAS '10) . New York, NY:
ACM
(2010).
DOI:
10.1145/1814217.1814224.
http://dl.acm.org/cita-
tion.cfm?doid=1814217.1814224
[Miller 2009] Miller, Alex. Java Platform Concurrency Gotchas. JavaOne Conference
(2009).
[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. “What Are Race Conditions?
Some Issues and Formalization.” ACM Letters on Programming Languages and Systems
1(1):74-88 (1992). http://dl.acm.org/citation.cfm?id=130616.130623
[Oaks 2001] Oaks, Scott. Java Security . Sebastopol, CA: O'Reilly (2001).
[Oracle 2010a] JavaSE6HotSpot VirtualMachineGarbageCollection Tuning.Oracle
(2010). www.oracle.com/technetwork/java/javase/gc-tuning-6-140523.html
[Oracle 2010b] New I/O APIs. Oracle (2010). http://docs.oracle.com/javase/1.5.0/docs/
guide/nio/
[Oracle 2011a] Java PKI Programmer's Guide. Oracle (2011). http://docs.oracle.com/
javase/6/docs/technotes/guides/security/certpath/CertPathProgGuide.html
[Oracle 2011b] Java SE 6 Documentation. Oracle (2011). http://docs.oracle.com/javase/
6/docs/index.html
[Oracle 2011c] Packagejavax.servlet.http.Oracle(2011). http://docs.oracle.com/javaee/6/
api/javax/servlet/http/package-summary.html
[Oracle 2011d] Permissions in the Java SE 6 Development Kit (JDK). Oracle (2011).
http://docs.oracle.com/javase/6/docs/technotes/guides/security/permissions.html
[Oracle 2013a] API for Privileged Blocks. Oracle (2013). http://download.java.net/jdk8/
docs/technotes/guides/security/doprivileged.html
[Oracle 2013b] “ReadingASCIIPasswordsfromanInputStreamExample,”Java Cryp-
tography Architecture (JCA) Reference Guide. Oracle (2013). http://docs.oracle.com/
javase/7/docs/technotes/guides/security/crypto/CryptoSpec.html#ReadPassword
Search WWH ::




Custom Search