[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols.
IEEE Transactions on Software Engineering 22(1):
6â“15 6–15 (1996).
[API 2006]
Java Platform, Standard Edition 6 API Specification. Oracle (2006/2011).
...
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "
partial Partial order." In
Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "
total Total order." In
Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).
...
[Cohen 1981] Cohen, D.
On Holy Wars and a Plea for Peace,
IEEE Computer, 14(10):
48â“54 48–54 (1981).
Anchor |
---|
| Conventions 09 |
---|
| Conventions 09 |
---|
|
[Conventions 2009]
Code Conventions for the Java Programming Language. Oracle (2009).
...
[Davis 2008] Davis, Mark, and
Martin DürstKen Whistler.
Unicode Standard Annex #15: Unicode Normalization Forms (2008).
...
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations.
Communications of the ACM, 9(3):
143â“155 143–155 (1966). doi: 10.1145/365230.365252.
...
[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki.
Java Memory Leaksâ”Catch Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).
[Haack 2006] Haack, Christian, Erik Poll, Jan
SchäferSchäfer, and Aleksy Schubert.
Immutable Objects in Java. Research report, Radboud University Nijmegen (2006).
[Haggar 2000] Haggar, Peter.
_Practical Java⢠Java™ Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).
...
[Hitchens 2002] Hitchens, Ron.
_Java⢠Java™ NIO_. Cambridge, MA: O'Reilly (2002).
[Hornig 2007] Hornig, Charles.
Advanced Java⢠Java™ Globalization. JavaOne Conference (2007).
...
[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java.
IEE Proceedings: Software 145(2/3):
41â“50 41–50 (1998).
Anchor |
---|
| IEC 60812 2006 |
---|
| IEC 60812 2006 |
---|
|
[IEC 60812 2006] IEE (International Electrotechnical Commission).
Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).
...
[JDK7 2008]
Java⢠Java™ Platform, Standard Edition 7 Documentation. Oracle (2008).
...
Anchor |
---|
| Jovanovic 06 |
---|
| Jovanovic 06 |
---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda.
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.
258â“263258–263, May
21â“2421–24, Oakland, CA (2006).
[JPDA 2004]
Java Platform Debugger Architecture (JPDA). Oracle (2004).
[JPL 2006] Arnold, Ken, James Gosling, and David Holmes.
_The Java⢠Java™ Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).
[JSR-133 2004]
JSR-133: JavaTM Java™ Memory Model and Thread Specification (2004).
...
Anchor |
---|
| Knoernschild 01 |
---|
| Knoernschild 01 |
---|
|
[Knoernschild 2001] Knoernschild, Kirk.
_Java⢠Java™ Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).
[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code.
IEEE Software 25(1):
13â“19 13–19 (2008).
[Langer 2008] Langer, Angelica, trainer and consultant.
http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008).
...
[Lea 2000b] Lea, Doug, and William Pugh.
Correct and Efficient Synchronization of Java⢠Technologyâ“based Java™ Technology–based Threads. JavaOne Conference (2000).
...
[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha
, eBay Inc.
Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009).
[Liang 1997] Liang, Sheng.
_The Java⢠Java™ Native Interface, : Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).
[Liang 1998] Liang, Sheng, and Gilad Bracha.
Dynamic Class Loading in the Java⢠Java™ Virtual Machine. In
Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).
[Lieberman 1986] Lieberman, Henry.
Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In
Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp.
214â“223214–223, Portland, OR (1986).
[Lo 2005] Lo, Chia-Tien Dan,
Witawas Srisa-an,
Witawas, and
Chang, J. Morris
Chang.
Security Issues in Garbage Collection.
STSC Crosstalk, (2005, October).
...
[Long 2011]
Long, Fred
Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland
, and David Svoboda.
The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)
[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation.
Crossroads 4(3):
21â“23 21–23 (1997).
[Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans.
Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).
...
[Manson 2006] Manson, Jeremy, and William Pugh.
The Java⢠Java™ Memory Model: The Building Block of Concurrency. JavaOne Conference (2006).
[Martin 1996] Martin, Robert C.
Granularity.
The C++ Report 8(10):
57â“62 57–62 (1996).
[McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).
...
[Mettler 2010b] Adrian Mettler and David Wagner,
Class Properties for Security Review in an Object-Capability Subset of Java,
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7,
DOI doi: 10.1145/1814217.1814224, 2010.
...
Anchor |
---|
| Permissions 08 |
---|
| Permissions 08 |
---|
|
[Permissions 2008]
Permissions in the Java⢠Java™ SE 6 Development Kit (JDK). Oracle (2008).
...
[Phillips 2005] Phillips, Addison P.
Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April
6â“86–8, Berlin (2005).
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin.
Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).
...
[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner
, and Eldon Metz.
The Elements of Java Style. New York: Cambridge University Press (2000).
...
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics.
Communications of the ACM 17(7):
388â“402 388–402 (1974).
[Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In
Proceedings of the IEEE 63(9):
1278â“13081278–1308.
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).
...
[Schneier 2000] Schneier, Bruce.
_Secrets and Liesâ”Digital Lies—Digital Security in a Networked World_. New York: Wiley (2000).
...
[Seacord 2005] Seacord, Robert C.
Secure Coding in C and C++. Boston: Addison-Wesley (2005). See
http://www.cert.org/books/secure-coding for news and errata.
[Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata. [SecArch 2006]
Java 2 Platform Security Architecture. Oracle (2006).
...
[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai.
_Core Security Patterns: Best Practices and Strategies for J2EEâ¢J2EE™, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).
[Steele 1977] Steele, Guy Lewis.
Arithmetic Shifting Considered Harmful.
SIGPLAN Notices 12(11):
61â“69 61–69 (1977).
[Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).
...
[Sun 2008]
Java⢠Java™ Plug-in and Applet Architecture. Oracle (2008).
...
[W3C 2008] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and
François François Yergeau.
Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008).
...
[Zadegan 2009] Zadegan, Bryant.
A lesson Lesson on infinite loopsInfinite Loops (2009).
[Zukowski 2004] Zukowski, John.
Java Developer Connection Tech Tips: Creating Custom Security Permissions (2004).