Author:
Shieh Shiuh-Pyng,Yang Wen-Her
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference22 articles.
1. Apache Development Group, Apache modules, http://www.apache.org/docs/mod/index.html, February 1999.
2. The world wide web;Berners-Lee;Comm. ACM,1994
3. CERT Coordination Center, Java implementations can allow connections to an arbitrary host, CERT Advisory CA-96.05, ftp://info.cert.org/pub/cert_advisories/CA-96.05.java_applet_security_mgr, March 1996.
4. CERT Coordination Center, Weaknesses in Java bytecode verifier, CERT Advisory CA-96.07, ftp://info.cert.org/pub/cert_advisories/CA-96.07.java_bytecode_verifier, March 1996.
5. D. Dean, E.W. Felten, D.S. Wallach, Java security: from HotJava to Netscape and beyond, Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1996.