[1] Thompson, K., ˜ ˜Reflections on Trusting Trust, Communications of the ACM , Vol. 27, No. 8, August 1984, pp. 761 “763.
[2] Rubin, A. D., ˜ ˜Location-Independent Data/Software Integrity Protocol, Request for Comments 1805, June 1995.
[3] Rubin, A. D., ˜ ˜Trusted Distribution of Software Over the Internet, Proceedings of Internet Society Symposium on Network and Distributed System Security , February 1995, pp. 47 “53.
[4] Goldberg, I., et al., ˜ ˜A Secure Environment for Untrusted Helper Applications, Proceedings of USENIX Security Symposium , July 1996, pp. 1 “13.
[5] Flanagan, D., Java in a Nutshell, Second Edition , Sebastopol, CA: O Reilly & Associates, 1997.
295
[6] Oaks, S., Java Security , Sebastopol, CA: O Reilly & Associates, 1998.
[7] Luotonen, A., Web Proxy Servers , Upper Saddle River, NJ: Prentice Hall, 1998.
[8] Martin, D. M., S. Rajagopalan, and A. D. Rubin, ˜ ˜Blocking Java Applets at the Firewall, Proceedings of Internet Society Symposium on Network and Distributed System Security (SNDSS 97), February 1997.