Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Govindavajhala, Andrew W. Appel, Using Memory Errors to Attack a Virtual Machine, 2003 IEEE Symposium on Security and Privacy, pp. 154–165, 2003, http://www.cs.princeton.edu/∼appel/papers/memerr.pdf
L. Gong, JavaTM 2 Platform Security Architecture, http://java.sun.com/j2se/1.4.2/ docs/guide/security/spec/security-spec.doc.html. Permissions findet man unter http://java.sun.com/j2se/1.4.2/docs/guide/security/permissions.html
N. Hardy, The Confused Deputy (or why capabilities might have been invented), ACM SIGOPS Operating Systems Review Vol. 22 (4) (October 1988), pp. 36–38
JAAS Authentication Tutorial, http://java.sun.com/j2se/1.4.2/docs/guide/security/ jaas/tutorials/GeneralAcnOnly.html
IBM Java Security Research Homepage, http://domino.research.ibm.com/comm/ research_projects.nsf/pages/javasec.index.html
L. Koved, T. Habeck, M. Pistoia, Enabling Java 2 Runtime Security with Eclipse Plug-ins, OSGi Developer Forum and World Congress. Paris, France, October 2005
G. Kiczales, A. Paeppke, Open Implementations and Meta-Object Protocols, Tutorial, http://www2.parc.com/csl/groups/sda/publications/papers/Kiczales- TUT95/for-web.pdf
G. Krüger, Handbuch der Java-Programmierung, Addison-Wesley, 2002
M.S. Miller, J. Shapiro, Paradigm Regained: Abstraction Mechanisms for Access Control, http://www.eros-os.org/papers/paradigm-final.pdf
T. Neward, Effective Enterprise Java, Addison-Wesley 2004
T. Neward, java.security.Policy: When “java.Policy” Just Isn’t Good Enough, http://www.javageeks.com/Papers/JavaPolicy/JavaPolicy.pdf
Open eXtensible Access Control Markup Language, www.openxacml.org
M. Pistoia, L. Koved, T. Habeck, SWORD4J: Secure WORkbench Development environment For Java. ECOOP 2005 – 19th European Conference on Object-Oriented Programming, ACM, July 2005.
M. Pistoia, L. Koved, T. Habeck„ Adding Security to Eclipse, http://www.eclipse.org/equinox/incubator/security/documents/addingsecurity/ Adding%20Security%20to%20Eclipse.pdf
V. Samar, C. Lai, Making Login Services Independent of Authentication Technologies, http://java.sun.com/security/jaas/doc/pam.html
P. Thomas, Homepage, http://ptrthomas.wordpress.com
D. Wallach, E. Felten, et al., Extensible Security Architectures for Java
H. Wunderlich et al., WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook, IBM RedBook, http://www.redbooks.ibm.com/abstracts/sg246086.html?Open
eXtensible Access Control Markup Language (XACML) Version 2.0, www.oasis.org
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R., Kriha, W. (2009). Java Sprach- und Plattformsicherheit. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-78959-8_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78958-1
Online ISBN: 978-3-540-78959-8
eBook Packages: Computer Science and Engineering (German Language)