Check out the new USENIX Web site.



Next: About this document Up: Resource Access Control for Previous: Conclusion

References

1
K. Arnold, and J. Gosling , ``The Java Programming Language,'' Addison-Wesley, 1996

2
``Java Beans: A Component Architecture for Java,'' Online document at https://www.javasoft.com/beans, December '96.

3
``Castanet Whitepaper,'' Online document at https://www.marimba.com, October 1996.

4
J. Levy, and J. Ousterhout, ``Safe Tcl: A Toolbox for Constructing Electronic Meeting Places,'' First USENIX workshop on Electronic Commerce, 1995.

5
J. E. White, ``Telescript Language Reference Manual,'' General Magic Inc., October 1995.

6
``Cryptolope Container Technology: A White Paper,'' online documentation at https://www.cryptolope.ibm.com, September 1996.

7
M. Abadi, M. Burrows, and B. Lampson, ``A Calculus for Access Control in Distributed Systems,'' ACM Transactions on Programming Languages and Systems, Vol 15 September 1993, pp706-734.

8
A. Wollrath, R. Riggs, and J. Waldo, ``A Distributed Object Model for the Java System,'' Proceedings of the USENIX Conference on Object-Oriented Technology and Systems '96, July 1996.

9
N. Nagaratnam, A. Srinivasan, and D. Lea, ``Remote Objects in Java,'' Proceedings of the IASTED Intl. Conference on Networks, January 1996.

10
T. Jaeger, A. Rubin, and A. Prakash, ``Building Systems That Flexibly Control Downloaded Executable Content'', Proceedings of the Sixth USENIX Security Symposium, July 1996.

11
B. Schneier, ``Applied Cryptography,'' Wiley and Sons, 1994.

12
R. Rivest, A. Shamir, and L. Adleman, ``On Digital Signatures and Crypto Systems,'' Communications of the ACM, 1978.

13
M. Erdos, B. Hartmann and M. Mueller, ``Security Reference Model for the Java Developer's Kit 1.0.2,'', On-line document, https://java.sun.com, 1997.

14
Sun Microsystems, ``Security in JDK1.1,'' Java Documentation, https://java.sun.com, 1997


nataraj@cat.syr.edu
Mon Apr 28 18:57:22 EDT 1997