Next: About this document
Up: Resource Access Control for
Previous: Conclusion
References
- 1
- K. Arnold, and J. Gosling , ``The Java Programming Language,'' Addison-Wesley, 1996
- 2
- ``Java Beans: A Component Architecture for Java,'' Online document at https://www.javasoft.com/beans, December '96.
- 3
- ``Castanet Whitepaper,'' Online document at https://www.marimba.com, October 1996.
- 4
- J. Levy, and J. Ousterhout, ``Safe Tcl: A Toolbox for Constructing Electronic Meeting Places,'' First USENIX workshop on Electronic Commerce, 1995.
- 5
- J. E. White, ``Telescript Language Reference Manual,'' General Magic Inc., October 1995.
- 6
- ``Cryptolope Container Technology: A White Paper,'' online documentation at https://www.cryptolope.ibm.com, September 1996.
- 7
- M. Abadi, M. Burrows, and B. Lampson, ``A Calculus for Access Control in Distributed Systems,'' ACM Transactions on Programming Languages and Systems, Vol 15 September 1993, pp706-734.
- 8
- A. Wollrath, R. Riggs, and J. Waldo, ``A Distributed Object Model for the Java System,'' Proceedings of the USENIX Conference on Object-Oriented Technology and Systems '96, July 1996.
- 9
- N. Nagaratnam, A. Srinivasan, and D. Lea, ``Remote Objects in Java,'' Proceedings of the IASTED Intl. Conference on Networks, January 1996.
- 10
- T. Jaeger, A. Rubin, and A. Prakash, ``Building Systems That Flexibly Control Downloaded Executable Content'', Proceedings of the Sixth USENIX Security Symposium, July 1996.
- 11
- B. Schneier, ``Applied Cryptography,'' Wiley and Sons, 1994.
- 12
- R. Rivest, A. Shamir, and L. Adleman, ``On Digital Signatures and Crypto Systems,'' Communications of the ACM, 1978.
- 13
- M. Erdos, B. Hartmann and M. Mueller, ``Security Reference Model for the Java Developer's Kit 1.0.2,'', On-line document, https://java.sun.com, 1997.
- 14
- Sun Microsystems, ``Security in JDK1.1,'' Java Documentation, https://java.sun.com, 1997
nataraj@cat.syr.edu
Mon Apr 28 18:57:22 EDT 1997