Java security

Results: 406



#Item
171Java programming language / Computing platforms / Assemblers / Jasmin / Java / Main function / KeY / Immutable interface / Computing / Java platform / Cross-platform software

Colorado Software Summit: October 23 – 28, 2005 © Copyright 2005, Simon Roberts Java Security in Practice Simon Roberts

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-01-03 04:31:37
172Web application frameworks / Java platform / Java specification requests / Java Platform /  Enterprise Edition / Enterprise JavaBeans / Java / EAR / Computing / Java enterprise platform / Computing platforms

Colorado Software Summit: October 26 – 31, 2003 © Copyright 2003, Omegapoint AB / Frobozz AB J2EE Security Model Dan Johnsson

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-01-03 03:42:55
173Computer security / Access control / Object-oriented programming / Capability-based security / Object-capability model / Ambient authority / Principle of least privilege / Java / Object / Computing / Security / Software engineering

I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
174Cryptographic protocols / HTTP / Internet protocols / Spring Security / Cross-site request forgery / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / Authentication / WebSocket / Computing / Java enterprise platform / Directory services

Spring Security Reference

Add to Reading List

Source URL: docs.spring.io

Language: English - Date: 2015-03-25 23:19:32
175Java Authentication and Authorization Service / Java platform / Computer network security / Java Agent Development Framework / Kerberos / Access control / Privilege / Computing / Security / Computer security

J ADE S ecurit y Add -On GUID E JADE SECURITY GUIDE USAGE RESTRICTED ACCORDING TO LICENSE AGREEMENT. last update: 28-February[removed]JADE 3.3 Authors: JADE Board

Add to Reading List

Source URL: jade.tilab.com

Language: English - Date: 2014-07-11 08:15:22
176Java Web Start / Java / JAR / Rich Internet application / WebObjects / Computing / Java platform / Java version history

Feature Focus Java changes and ImageSite With no less than six Java updates released in the past year alone, Oracle has been addressing many of the longstanding security issues affecting Java. Unfortunately, every new re

Add to Reading List

Source URL: www.equorum.com

Language: English - Date: 2014-03-25 12:34:03
177Cross-platform software / Software testing / Cross-site scripting / JavaScript / HTTP cookie / Vulnerability / Form / Java / Application firewall / Computing / Computer security / Cyberwarfare

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
178Aquatic ecology / Wetland / El Niño-Southern Oscillation / Rice / Indonesia / Agriculture / Sustainable agriculture / Food security / West Java / Earth / Atmospheric sciences / Environment

Palawija News, Volume 18, Number 4

Add to Reading List

Source URL: www.uncapsa.org

Language: English - Date: 2006-09-15 00:17:20
179Cross-platform software / Java platform / Java programming language / Computer security / Antivirus software / Java applet / Applet / Java / Malware / Computing / Software / System software

Jarhead Analysis and Detection of Malicious Java Applets Johannes Schlumberger Christopher Kruegel

Add to Reading List

Source URL: wwwcip.cs.fau.de

Language: English - Date: 2012-10-25 21:36:58
180Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:11
UPDATE