1. Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R. (1997, “Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2”, Proceedings of the USENIX Symposium on Internet Technologies and Systems, USENIX Association, Monterey, CA, pp. 103‐12.
2. Gong, L. and Scemers, R. (1998, “Implementing protection domains in the Java Development Kit 1.2”, Proceedings of the Symposium on Network and Distributed System Security, online, http://isoc/NDSS98/
3. Gritzalis, D. (1991, Information Systems Security, GCS Publications, Athens.
4. Lindhorn, T., and Yellin, F. (1997, The Java Virtual Machine Specification, Addison‐Wesley, Reading, MA and Wokingham.
5. McGraw, G. and Felten, E. (1996, Java Security Hostile Applets, Holes and Antidotes, J. Wiley & Sons Inc., New York, NY.