Academic literature on the topic 'Java security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Java security"
Zhang, Xiangmin. "Java Security." Library & Archival Security 16, no. 2 (June 2000): 5–20. http://dx.doi.org/10.1300/j114v16n02_02.
Full textOaks, Scott. "Java Security." EDPACS 27, no. 4 (October 1999): 15–16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30274.4.
Full textGong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.
Full textGong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.
Full textChen, E. "Poison Java [data security]." IEEE Spectrum 36, no. 8 (August 1999): 38–43. http://dx.doi.org/10.1109/6.780997.
Full textGougher, R. A. "Grounded Look at Java Security." IEEE Software 15, no. 6 (November 1998): 124–25. http://dx.doi.org/10.1109/ms.1998.731176.
Full textKoved, L., A. J. Nadalin, D. Neal, and T. Lawson. "The evolution of Java security." IBM Systems Journal 37, no. 3 (1998): 349–64. http://dx.doi.org/10.1147/sj.373.0349.
Full textMarkantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 4 (January 1999): 26–27. http://dx.doi.org/10.1016/s1363-4127(99)80050-8.
Full textMcClure, Ben. "Java kit gets better security." Computers & Security 17, no. 2 (January 1998): 158. http://dx.doi.org/10.1016/s0167-4048(97)82008-1.
Full textMarkantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 3, no. 2 (January 1998): 82–89. http://dx.doi.org/10.1016/s0167-4048(98)80008-3.
Full textDissertations / Theses on the topic "Java security"
Doyon, Stéphane. "On the security of Java, the Java bytecode verifier." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ41890.pdf.
Full textSamson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.
Full textRecently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
Wanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.
Full textFrantz, Miles Eugene. "Enhancing CryptoGuard's Deployability for Continuous Software Security Scanning." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98521.
Full textMaster of Science
Throughout the rise of software development, there has been an increase in development speed with developers embracing methodologies that use higher rates of changes, such as Agile. Since Agile naturally addresses "problems of rapid change", this also increases the likelihood of insecure and vulnerable coding practices. Though consumers depend on various public applications, there can still be failures throughout the development process in applications such as the Iowa caucus application. It was determined the Iowa cacus application development teams' repository credentials (API key) was left within the application itself. API keys provide the credential to be able to directly interact with server systems, and if left unguarded can be easily exploited. Since the Iowa cacus application was released publicly, malicious actors (other people looking to exploit the application) may have already discovered this credential. Within our team we have created CryptoGuard, a program to analyze applications to detect cryptographic issues such as an API key. Creating it with scalability in mind, it was created to be able to scan enterprise code at a reasonable speed. To ensure its use within companies, we have been working on extending and enhancing the work to the current needs of Java developers. Verifying the current Java landscape, we investigated three different companies and their developer ecosystem surveys that are publicly available. Amongst these companies are; JetBrains, known for their Integrated Development Environments (IDE, or application to help write applications) and their own programming language, Snyk, known for their public security platform and anti-virus capability, and Jakarta EE, which is the new platform for the enterprise version of Java. Throughout these surveys, we accumulate more than 50,000 developers' responses, spanning various countries, company experience, and ages. With their responses amalgamated, we enhance CryptoGuard to be available to as many developers and their requests as possible.First, CryptoGuard is enhanced to scan a projects source code. After that, ensuring our project is hosted by a cloud service, we actively are extending our project to the Security Assurance Marketplace (SWAMP). Funded by the DHS, SWAMP not only supplies a public cloud for developers to use, but a local download option to scan a program within the user's own computer. Next, we create a plugin for two most used build tools, Gradle and Maven. Then to ensure CryptoGuard can be have reactive aide, CryptoSoule is created to aide minimal interface aide. Finally utilizing a live documentation service, an open source documentation website was created to provide working examples to the community.
Virden, Roy John. "An approach to mobile agent security in Java." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA343420.
Full textSchönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.
Full textMorcos, Alexander 1974. "A Java implementation of simple distributed security infrastructure." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/49658.
Full textIncludes bibliographical references (leaf 58).
by Alexander Morcos.
S.B.and M.Eng.
Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Full textTalhi, Chamseddine. "Memory-Constrained Security Enforcement." Doctoral thesis, Québec : Université Laval, 2007. http://www.theses.ulaval.ca/2007/24434/24434.pdf.
Full textLi, Louis. "Security Analysis of Java Web Applications Using String Constraint Analysis." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:14398534.
Full textBooks on the topic "Java security"
Loukides, Mike, and Debra Cameron, eds. Java Security. 2nd ed. Beijing: O'Reilly, 2001.
Find full textDaniel, Somerfield, ed. Professional Java security. Birmingham, UK ; Chicago, IL: Wrox Press, 2001.
Find full textS, MacGregor Robert, ed. Java network security. Upper Saddle River, N.J: Prentice Hall PTR, 1998.
Find full textCorporation, International Business Machines, ed. Java 2 network security. [S.l.]: IBM Corp., 1999.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.
Find full textMourad, Debbabi, ed. Embedded Java security: Security for mobile devices. London: Springer, 2007.
Find full textBook chapters on the topic "Java security"
Cheng, Fu. "Security." In Exploring Java 9, 139–41. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3330-6_13.
Full textJuneau, Josh. "Security." In Java 8 Recipes, 571–78. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6826-0_22.
Full textHopkins, Bruce, and Ranjith Antony. "Bluetooth Security." In Bluetooth for Java, 155–77. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-0763-4_9.
Full textJuneau, Josh. "Security." In Java EE 8 Recipes, 673–707. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3594-2_17.
Full textHanson, J. Jeffrey. "Security." In Pro JMX: Java Management Extensions, 213–36. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0699-6_10.
Full textJuneau, Josh. "Authentication and Security." In Java EE 7 Recipes, 537–62. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4426-4_14.
Full textCoffin, David. "Java Stored Procedures." In Expert Oracle and Java Security, 51–62. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_4.
Full textCoffin, David. "Enhancing Security." In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.
Full textdi Pisa, Filippo. "Spring Security." In Beginning Java™ and Flex, 183–94. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2386-3_6.
Full textSmarkusky, D., S. Demurjian, M. Bastarrica, and T. C. Ting. "Role Based Security and Java." In Database Security XII, 205–19. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1_13.
Full textConference papers on the topic "Java security"
Lim, Young-Chan, Hyo-Seong Park, Chul-Woo Park, Luna Clout, and Ki-Chang Kim. "Java Security Vulnerability Analysis Based on Java Access Permission Checking Tree." In Security 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.58.11.
Full textWallach, Dan S., Dirk Balfanz, Drew Dean, and Edward W. Felten. "Extensible security architectures for Java." In the sixteenth ACM symposium. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/268998.266668.
Full textHassan, Doaa, Sherif El Kassas, and Ibrahim Ziedan. "Developing a Security Typed Java Servlet." In 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.31.
Full textGong, Li. "Java Security: A Ten Year Retrospective." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.44.
Full textVenelle, Benjamin, Jeremy Briffaut, Laurent Clevy, and Christian Toinard. "Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine." In 2013 IEEE 16th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC). IEEE, 2013. http://dx.doi.org/10.1109/isorc.2013.6913208.
Full textAbadi, Aharon, Ran Ettinger, Yishai A. Feldman, and Mati Shomrat. "Automatically fixing security vulnerabilities in Java code." In the ACM international conference companion. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2048147.2048149.
Full textRiccioni, Anna, Enrico Denti, and Roberto Laschi. "An experimental environment for teaching Java security." In the 6th international symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1411732.1411735.
Full textZalewski, Dominik. "Security Enhancement of Java Remote Method Invocation." In 2006 International Conference on Dependability of Computer Systems. IEEE, 2006. http://dx.doi.org/10.1109/depcos-relcomex.2006.47.
Full textHaywood, Adley, Huiming Yu, and Xiaohong Yuan. "Teaching Java security to enhance cybersecurity education." In IEEE SOUTHEASTCON 2013. IEEE, 2013. http://dx.doi.org/10.1109/secon.2013.6567447.
Full textSong, Yongsang, Jongmoo Choi, and Kyongho Han. "Multimodal Security Enhancement Scheme for Java Card." In 2011 14th International Conference on Network-Based Information Systems (NBiS). IEEE, 2011. http://dx.doi.org/10.1109/nbis.2011.105.
Full textReports on the topic "Java security"
Evans, Nathanael P. .NET Security: Lessons Learned and Missed from Java. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada453231.
Full textKabat, J., and M. Upadhyay. Generic Security Service API Version 2 : Java Bindings. RFC Editor, June 2000. http://dx.doi.org/10.17487/rfc2853.
Full textUpadhyay, M., and S. Malkani. Generic Security Service API Version 2: Java Bindings Update. RFC Editor, August 2009. http://dx.doi.org/10.17487/rfc5653.
Full textKassab, Lora L., and Steven J. Greenwald. Towards Formalizing the Java Security Architecture of JDK 1.2. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada465148.
Full textUpadhyay, M., S. Malkani, and W. Wang. Generic Security Service API Version 2: Java Bindings Update. RFC Editor, May 2018. http://dx.doi.org/10.17487/rfc8353.
Full textNORTH CAROLINA UNIV AT CHAPEL HILL. Inquiry Response Security Issues with CGI Scripting and JAVA Implementations. Fort Belvoir, VA: Defense Technical Information Center, March 1998. http://dx.doi.org/10.21236/ada385419.
Full text