References


[1] Thompson, K., ˜ ˜Reflections on Trusting Trust, Communications of the ACM , Vol. 27, No. 8, August 1984, pp. 761 “763.

[2] Rubin, A. D., ˜ ˜Location-Independent Data/Software Integrity Protocol, Request for Comments 1805, June 1995.

[3] Rubin, A. D., ˜ ˜Trusted Distribution of Software Over the Internet, Proceedings of Internet Society Symposium on Network and Distributed System Security , February 1995, pp. 47 “53.

[4] Goldberg, I., et al., ˜ ˜A Secure Environment for Untrusted Helper Applications, Proceedings of USENIX Security Symposium , July 1996, pp. 1 “13.

[5] Flanagan, D., Java in a Nutshell, Second Edition , Sebastopol, CA: O Reilly & Associates, 1997.

295

[6] Oaks, S., Java Security , Sebastopol, CA: O Reilly & Associates, 1998.

[7] Luotonen, A., Web Proxy Servers , Upper Saddle River, NJ: Prentice Hall, 1998.

[8] Martin, D. M., S. Rajagopalan, and A. D. Rubin, ˜ ˜Blocking Java Applets at the Firewall, Proceedings of Internet Society Symposium on Network and Distributed System Security (SNDSS 97), February 1997.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net