Treffer 1 - 20
von 2.150
- 1
- 2
Seite in der Trefferliste auswählen
An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.
Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025
Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013
Java security extensions for a Java server in a hostile environment
Wheeler, D.M. ; Conyers, A. ; Luo, J. ; et al.
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :64-73 2001
Have Java's Security Issues Gotten out of Hand?
Garber, Lee
Computer. 45(12):18-21 Dec, 2012
An evaluation of the Java security model
Sterbenz, A.
Proceedings 12th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 1996., 12th Annual. :2-14 1996
Java Security: A Ten Year Retrospective
Gong, Li
2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :395-405 Dec, 2009
Java security: from HotJava to Netscape and beyond
Dean, D. ; Felten, E.W. ; Wallach, D.S.
Proceedings 1996 IEEE Symposium on Security and Privacy Security and privacy Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. :190-200 1996
Research on NTRU Algorithm for Mobile Java Security
Shen, Xiaoyu ; Du, Zhenjun ; Chen, Rong
2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. International Conference on. :366-369 Sep, 2009
Java security: present and near future
Li Gong
IEEE Micro Micro, IEEE. 17(3):14-19 Jun, 1997
Enabling Dynamic Security Policy in the Java Security Manager
FPS 2012; Foundations and practice of security
Autrel, F. ; Cuppens-Boulahia, N. ; Cuppens, F.
LECTURE NOTES IN COMPUTER SCIENCE. (7743):180-193
A systematic analysis and hardening of the Java security architecture
Holzinger, Philipp Albert ; Holzinger, Philipp Albert
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies
TC11 International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08
Scheffler, T. ; Geiss, S. ; Schnor, B.
INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING - IFIP. (278):157-172
Enhancing Java Security with History Based Access Control
International School on Foundations of Security Analysis and Design; Foundations of security analysis and design IV: FOSAD 2006/2007 tutorial lectures
Martinelli, F. ; Mori, P.
LECTURE NOTES IN COMPUTER SCIENCE. (4677):135-159
CHERI JNI: Sinking the Java Security Model into the C
Chisnall, David ; Davis, Brooks ; Gudka, Khilan ; et al.
ACM SIGPLAN notices. 52(4):569-584
Grounded Look at Java Security
Gougher, R.A.
IEEE Software IEEE Softw. Software, IEEE. 15(6):124-125 Jan, 1998
Overview of Java Security
Electronic commerce research; ICECR 4
Vasiu, L.
INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE RESEARCH. 2:541-549
Reflections on MOPs, Components, and Java Security
Object-oriented programming; ECOOP 2001
Caromel, D. ; Vayssiere, J.
LECTURE NOTES IN COMPUTER SCIENCE. :256-274
Performance of the Java security manager
Herzog, Almut ; Shahmehri, Nahid
In Computers & Security 2005 24(3):192-207
Java™ Security Infrastructure for Global Electronic Commerce
Software technology and engineering practice
Muftic, S. ; Morogan, M.
SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE. :181-186
- 1
- 2