Academic literature on the topic 'Java security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Java security"

1

Zhang, Xiangmin. "Java Security." Library & Archival Security 16, no. 2 (June 2000): 5–20. http://dx.doi.org/10.1300/j114v16n02_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oaks, Scott. "Java Security." EDPACS 27, no. 4 (October 1999): 15–16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30274.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, E. "Poison Java [data security]." IEEE Spectrum 36, no. 8 (August 1999): 38–43. http://dx.doi.org/10.1109/6.780997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gougher, R. A. "Grounded Look at Java Security." IEEE Software 15, no. 6 (November 1998): 124–25. http://dx.doi.org/10.1109/ms.1998.731176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koved, L., A. J. Nadalin, D. Neal, and T. Lawson. "The evolution of Java security." IBM Systems Journal 37, no. 3 (1998): 349–64. http://dx.doi.org/10.1147/sj.373.0349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Markantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 4 (January 1999): 26–27. http://dx.doi.org/10.1016/s1363-4127(99)80050-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McClure, Ben. "Java kit gets better security." Computers & Security 17, no. 2 (January 1998): 158. http://dx.doi.org/10.1016/s0167-4048(97)82008-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Markantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 3, no. 2 (January 1998): 82–89. http://dx.doi.org/10.1016/s0167-4048(98)80008-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Java security"

1

Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Samson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.

Full text
Abstract:
Récemment, les systèmes distribués sont devenus une catégorie fondamentale de systèmes informatiques. Par conséquent, leur sécurité est devenue essentielle. La recherche décrite dans ce document vise à apporter un éclaircissement sur leurs vulnérabilités quant à la sécurité. Pour ce faire, on a examiné les propriétés de sécurité qu'un système distribué considéré sécuritaire doit supporter. En cherchant un système avec lequel travailler, on a étudié des failles de sécurité des systèmes distribués existants. On a étudié la sécurité de Java et des outils utilisés pour sécuriser ces systèmes. Suite à ces recherches, un nouveau modèle de sécurité Java imposant de nouvelles propriétés de sécurité a été développé. Ce document commence par les résultats de notre recherche sur les systèmes distribués, les outils de sécurité, et la sécurité de Java. Ensuite, on décrit les détails du nouveau système pour finalement faire la démonstration des améliorations qu'apporte ce système avec un exemple.
Recently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
APA, Harvard, Vancouver, ISO, and other styles
3

Wanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.

Full text
Abstract:
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web applications. Has been collected and analyzed. Each vulnerability collected in this project, was exploited and secured. Demon- strations from a web application prototype, developed for this project. Brings real examples for each vulnerability, both secured, and insecured. The proto- type ran on a Tomcat web server, and was developed with frameworks such as Web, Spring and Hibernate. Connected to one PostgreSQL data source. All vulnerabilities was successfully implemented in Spring framework, and they were all exploited. Every vulnerability was also secured, with different tools and methods from earlier mentioned frameworks. As a result, real examples from the prototype is used for demonstration in the project, both in a secure and an insecure state. The result views Spring as a framework with good security potential. Most of the Spring specific vulnerabilities, are logical design flaws from developers that can be avoided. Vulnerabilities not related to Spring, such as the one collected for this project. Could be prevented by using methods from the Spring framework or intelligent programming. Which leads to conclusions. Web applications are always exposed to attacks, no matter the framework in use. Creative hackers search to discover new vul- nerabilities, and update old ones all the time. Developers has a responsibility, towards the web applications users. Web applications can not just developed for normal use, but also against possible misuse. Frameworks with good reputation and well processed models, is a good ground for developing a secure application.
APA, Harvard, Vancouver, ISO, and other styles
4

Frantz, Miles Eugene. "Enhancing CryptoGuard's Deployability for Continuous Software Security Scanning." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98521.

Full text
Abstract:
The increasing development speed via Agile may introduce overlooked security steps in the process, with an example being the Iowa Caucus application. Verifying the protection of confidential information such as social security numbers requires security at all levels, providing protection through any connected applications. CryptoGuard is a static code analyzer for Java. This program verifies that developers do not leave vulnerabilities in their application. The program aids the developer by identifying cryptographic misuses such as hard-coded keys, weak program hashes, and using insecure protocols. In my Master thesis work, I made several important contributions to improving the deployability, accessibility, and usability of CryptoGuard. I extended CryptoGuard to scan source and compiled code, created live documentation, and supported a dual cloud and local tool-suite. I also created build tool plugins and a program aid for CryptoGuard. In addition, I also analyzed several Java-related surveys encompassing more than 50,000 developers and reported interesting current practices of real-world software developers.
Master of Science
Throughout the rise of software development, there has been an increase in development speed with developers embracing methodologies that use higher rates of changes, such as Agile. Since Agile naturally addresses "problems of rapid change", this also increases the likelihood of insecure and vulnerable coding practices. Though consumers depend on various public applications, there can still be failures throughout the development process in applications such as the Iowa caucus application. It was determined the Iowa cacus application development teams' repository credentials (API key) was left within the application itself. API keys provide the credential to be able to directly interact with server systems, and if left unguarded can be easily exploited. Since the Iowa cacus application was released publicly, malicious actors (other people looking to exploit the application) may have already discovered this credential. Within our team we have created CryptoGuard, a program to analyze applications to detect cryptographic issues such as an API key. Creating it with scalability in mind, it was created to be able to scan enterprise code at a reasonable speed. To ensure its use within companies, we have been working on extending and enhancing the work to the current needs of Java developers. Verifying the current Java landscape, we investigated three different companies and their developer ecosystem surveys that are publicly available. Amongst these companies are; JetBrains, known for their Integrated Development Environments (IDE, or application to help write applications) and their own programming language, Snyk, known for their public security platform and anti-virus capability, and Jakarta EE, which is the new platform for the enterprise version of Java. Throughout these surveys, we accumulate more than 50,000 developers' responses, spanning various countries, company experience, and ages. With their responses amalgamated, we enhance CryptoGuard to be available to as many developers and their requests as possible.First, CryptoGuard is enhanced to scan a projects source code. After that, ensuring our project is hosted by a cloud service, we actively are extending our project to the Security Assurance Marketplace (SWAMP). Funded by the DHS, SWAMP not only supplies a public cloud for developers to use, but a local download option to scan a program within the user's own computer. Next, we create a plugin for two most used build tools, Gradle and Maven. Then to ensure CryptoGuard can be have reactive aide, CryptoSoule is created to aide minimal interface aide. Finally utilizing a live documentation service, an open source documentation website was created to provide working examples to the community.
APA, Harvard, Vancouver, ISO, and other styles
5

Virden, Roy John. "An approach to mobile agent security in Java." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA343420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Morcos, Alexander 1974. "A Java implementation of simple distributed security infrastructure." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/49658.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaf 58).
by Alexander Morcos.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Talhi, Chamseddine. "Memory-Constrained Security Enforcement." Doctoral thesis, Québec : Université Laval, 2007. http://www.theses.ulaval.ca/2007/24434/24434.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Louis. "Security Analysis of Java Web Applications Using String Constraint Analysis." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:14398534.

Full text
Abstract:
Web applications are exposed to myriad security vulnerabilities related to malicious user string input. In order to detect such vulnerabilities in Java web applications, this project employs string constraint analysis, which approximates the values that a string variable in a program can take on. In string constraint analysis, program analysis generates string constraints -- assertions about the relationships between string variables. We design and implement a dataflow analysis for Java programs that generates string constraints and passes those constraints to the CVC4 SMT solver to find a satisfying assignment of string variables. Using example programs, we illustrate the feasibility of the system in detecting certain types of web application vulnerabilities, such as SQL injection and cross-site scripting.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Java security"

1

Sethi, Harpreet. Java security. Cincinnati, Ohio: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loukides, Mike, and Debra Cameron, eds. Java Security. 2nd ed. Beijing: O'Reilly, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1963-, Felten Edward, ed. Java security. New York: Wiley, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oaks, Scott. Java security. Cambridge: O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, NetLibrary, ed. Java security. Sebastopol, CA: O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daniel, Somerfield, ed. Professional Java security. Birmingham, UK ; Chicago, IL: Wrox Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, MacGregor Robert, ed. Java network security. Upper Saddle River, N.J: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Corporation, International Business Machines, ed. Java 2 network security. [S.l.]: IBM Corp., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Debbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mourad, Debbabi, ed. Embedded Java security: Security for mobile devices. London: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Java security"

1

Cheng, Fu. "Security." In Exploring Java 9, 139–41. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3330-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Juneau, Josh. "Security." In Java 8 Recipes, 571–78. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6826-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hopkins, Bruce, and Ranjith Antony. "Bluetooth Security." In Bluetooth for Java, 155–77. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-0763-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Juneau, Josh. "Security." In Java EE 8 Recipes, 673–707. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3594-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanson, J. Jeffrey. "Security." In Pro JMX: Java Management Extensions, 213–36. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0699-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juneau, Josh. "Authentication and Security." In Java EE 7 Recipes, 537–62. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4426-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coffin, David. "Java Stored Procedures." In Expert Oracle and Java Security, 51–62. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Coffin, David. "Enhancing Security." In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

di Pisa, Filippo. "Spring Security." In Beginning Java™ and Flex, 183–94. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2386-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smarkusky, D., S. Demurjian, M. Bastarrica, and T. C. Ting. "Role Based Security and Java." In Database Security XII, 205–19. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Java security"

1

Lim, Young-Chan, Hyo-Seong Park, Chul-Woo Park, Luna Clout, and Ki-Chang Kim. "Java Security Vulnerability Analysis Based on Java Access Permission Checking Tree." In Security 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.58.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wallach, Dan S., Dirk Balfanz, Drew Dean, and Edward W. Felten. "Extensible security architectures for Java." In the sixteenth ACM symposium. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/268998.266668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hassan, Doaa, Sherif El Kassas, and Ibrahim Ziedan. "Developing a Security Typed Java Servlet." In 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gong, Li. "Java Security: A Ten Year Retrospective." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Venelle, Benjamin, Jeremy Briffaut, Laurent Clevy, and Christian Toinard. "Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine." In 2013 IEEE 16th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC). IEEE, 2013. http://dx.doi.org/10.1109/isorc.2013.6913208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abadi, Aharon, Ran Ettinger, Yishai A. Feldman, and Mati Shomrat. "Automatically fixing security vulnerabilities in Java code." In the ACM international conference companion. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2048147.2048149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Riccioni, Anna, Enrico Denti, and Roberto Laschi. "An experimental environment for teaching Java security." In the 6th international symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1411732.1411735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zalewski, Dominik. "Security Enhancement of Java Remote Method Invocation." In 2006 International Conference on Dependability of Computer Systems. IEEE, 2006. http://dx.doi.org/10.1109/depcos-relcomex.2006.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Haywood, Adley, Huiming Yu, and Xiaohong Yuan. "Teaching Java security to enhance cybersecurity education." In IEEE SOUTHEASTCON 2013. IEEE, 2013. http://dx.doi.org/10.1109/secon.2013.6567447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Song, Yongsang, Jongmoo Choi, and Kyongho Han. "Multimodal Security Enhancement Scheme for Java Card." In 2011 14th International Conference on Network-Based Information Systems (NBiS). IEEE, 2011. http://dx.doi.org/10.1109/nbis.2011.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Java security"

1

Evans, Nathanael P. .NET Security: Lessons Learned and Missed from Java. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada453231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kabat, J., and M. Upadhyay. Generic Security Service API Version 2 : Java Bindings. RFC Editor, June 2000. http://dx.doi.org/10.17487/rfc2853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Upadhyay, M., and S. Malkani. Generic Security Service API Version 2: Java Bindings Update. RFC Editor, August 2009. http://dx.doi.org/10.17487/rfc5653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kassab, Lora L., and Steven J. Greenwald. Towards Formalizing the Java Security Architecture of JDK 1.2. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Upadhyay, M., S. Malkani, and W. Wang. Generic Security Service API Version 2: Java Bindings Update. RFC Editor, May 2018. http://dx.doi.org/10.17487/rfc8353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

NORTH CAROLINA UNIV AT CHAPEL HILL. Inquiry Response Security Issues with CGI Scripting and JAVA Implementations. Fort Belvoir, VA: Defense Technical Information Center, March 1998. http://dx.doi.org/10.21236/ada385419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography