Security Technologies for the World Wide Web, Second Edition

[1] Thompson, K., ˜ ˜Reflections on Trusting Trust, Communications of the ACM , Vol. 27, No. 8, August 1984, pp. 761 “763.

[2] Rubin, A. D., ˜ ˜Location-Independent Data/Software Integrity Protocol, Request for Comments 1805, June 1995.

[3] Rubin, A. D., ˜ ˜Trusted Distribution of Software Over the Internet, Proceedings of Internet Society Symposium on Network and Distributed System Security , February 1995, pp. 47 “53.

[4] Goldberg, I., et al., ˜ ˜A Secure Environment for Untrusted Helper Applications, Proceedings of USENIX Security Symposium , July 1996, pp. 1 “13.

[5] Flanagan, D., Java in a Nutshell, Second Edition , Sebastopol, CA: O Reilly & Associates, 1997.

295

[6] Oaks, S., Java Security , Sebastopol, CA: O Reilly & Associates, 1998.

[7] Luotonen, A., Web Proxy Servers , Upper Saddle River, NJ: Prentice Hall, 1998.

[8] Martin, D. M., S. Rajagopalan, and A. D. Rubin, ˜ ˜Blocking Java Applets at the Firewall, Proceedings of Internet Society Symposium on Network and Distributed System Security (SNDSS 97), February 1997.

Категории