References


[J2SE] Li Gong. "Java Security Architecture." Java™ 2 SDK, Standard Edition Documentation Version 1.4.2. Sun Microsystems, 2003. http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc1.html and http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc2.html.

[J2SE5] "J2SE 5.0 Platform Specifications," Sun Microsystems, 2004. http://java.sun.com/j2se/1.5.0/docs/api/

[J2ME] "J2ME Platform Specifications," Sun Microsystems, 2003. http://java.sun.com/j2me/

[JavaCard] "Java Card Platform Specifications," Sun Microsystems, 2003. http://java.sun.com/products/javacard/

[JWS] "Java Web Start Technology Specifications," Sun Microsystems, 2003. http://java.sun.com/products/javawebstart/.

[Obfuscation] Christian Collberg and Clark Thomborson. "Watermarking, Tamperproofing, and ObfuscationTools for Software Protection." IEEE Transactions on Software Engineering 28:8, 735-746, August 2002

[PrevTransform] Christian Collberg, Clark Thomborson, and Douglas Low. "A Taxonomy of Obfuscating Transformations." Technical Report 148, Department of Computer Science, University of Auckland, New Zealand, July 1997. http://www.cs.auckland.ac.nz/~collberg/Research/Publications/CollbergThomborsonLow97a/index.html




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net