Journal articles on the topic 'Java security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Java security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Xiangmin. "Java Security." Library & Archival Security 16, no. 2 (June 2000): 5–20. http://dx.doi.org/10.1300/j114v16n02_02.
Full textOaks, Scott. "Java Security." EDPACS 27, no. 4 (October 1999): 15–16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30274.4.
Full textGong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.
Full textGong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.
Full textChen, E. "Poison Java [data security]." IEEE Spectrum 36, no. 8 (August 1999): 38–43. http://dx.doi.org/10.1109/6.780997.
Full textGougher, R. A. "Grounded Look at Java Security." IEEE Software 15, no. 6 (November 1998): 124–25. http://dx.doi.org/10.1109/ms.1998.731176.
Full textKoved, L., A. J. Nadalin, D. Neal, and T. Lawson. "The evolution of Java security." IBM Systems Journal 37, no. 3 (1998): 349–64. http://dx.doi.org/10.1147/sj.373.0349.
Full textMarkantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 4 (January 1999): 26–27. http://dx.doi.org/10.1016/s1363-4127(99)80050-8.
Full textMcClure, Ben. "Java kit gets better security." Computers & Security 17, no. 2 (January 1998): 158. http://dx.doi.org/10.1016/s0167-4048(97)82008-1.
Full textMarkantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 3, no. 2 (January 1998): 82–89. http://dx.doi.org/10.1016/s0167-4048(98)80008-3.
Full textNichol, Sandy. "Java security bug found, patched." Computers & Security 18, no. 5 (January 1999): 434. http://dx.doi.org/10.1016/s0167-4048(99)80096-0.
Full textWallach, Dan S., Dirk Balfanz, Drew Dean, and Edward W. Felten. "Extensible security architectures for Java." ACM SIGOPS Operating Systems Review 31, no. 5 (December 1997): 116–28. http://dx.doi.org/10.1145/269005.266668.
Full textLi Gong. "Java security: present and near future." IEEE Micro 17, no. 3 (1997): 14–19. http://dx.doi.org/10.1109/40.591650.
Full textMeyer, Helen. "eSafe ups ante for Java, security." Computers & Security 17, no. 1 (January 1998): 57. http://dx.doi.org/10.1016/s0167-4048(97)80253-2.
Full textMcClure, Ben. "Security companies hype up Java risks." Computers & Security 17, no. 3 (January 1998): 226. http://dx.doi.org/10.1016/s0167-4048(98)80331-3.
Full textHerzog, Almut, and Nahid Shahmehri. "Performance of the Java security manager." Computers & Security 24, no. 3 (May 2005): 192–207. http://dx.doi.org/10.1016/j.cose.2004.08.006.
Full textPandey, Swati. "INFORMATION FLOW SECURITY IN MULTITHREADED JAVA APPLICATIONS." International Journal of Advanced Research 5, no. 5 (May 31, 2017): 1146–57. http://dx.doi.org/10.21474/ijar01/4225.
Full textViega, John, Gary McGraw, Tom Mutdosch, and Edward W. Felten. "Statically Scanning Java Code: Finding Security Vulnerabilities." IEEE Software 17, no. 5 (September 2000): 68–74. http://dx.doi.org/10.1109/52.877869.
Full textHopwood, David. "A comparison between Java and ActiveX security." Network Security 1997, no. 12 (December 1997): 15–20. http://dx.doi.org/10.1016/s1353-4858(97)88552-2.
Full textHopwood, David. "A comparison between java and activeX security." Computers & Security 16, no. 6 (January 1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84702-5.
Full textMenkus, Belden. "Java Raises Control, Audit, and Security Issues." EDPACS 24, no. 6 (December 1996): 11–16. http://dx.doi.org/10.1080/07366989609452286.
Full textCaromel, Denis, and Julien Vayssière. "A security framework for reflective Java applications." Software: Practice and Experience 33, no. 9 (May 15, 2003): 821–46. http://dx.doi.org/10.1002/spe.528.
Full textDeshmukh, A. A. "Data Security Analysis and Security Extension for Smart Cards Using Java Card." International Journal of Advanced Information Technology 2, no. 2 (April 30, 2012): 41–57. http://dx.doi.org/10.5121/ijait.2012.2204.
Full textDebbabi, Mourad, Mohamend Saleh, Chamseddine Talhi, and Sami Zhioua. "Security Evaluation of J2ME CLDC Embedded Java Platform." Journal of Object Technology 5, no. 2 (2006): 125. http://dx.doi.org/10.5381/jot.2006.5.2.a2.
Full textHannavi, Iin Endya, Minar Ferichani, Ernoiz Antriyandarti, and Susi Wuri Ani. "RURAL HOUSEHOLD FOOD SECURITY IN KUDUS CENTRAL JAVA." Jurnal Agribest 2, no. 2 (September 15, 2018): 179. http://dx.doi.org/10.32528/agribest.v2i2.1629.
Full textDAM, MADS, BART JACOBS, ANDREAS LUNDBLAD, and FRANK PIESSENS. "Security monitor inlining and certification for multithreaded Java." Mathematical Structures in Computer Science 25, no. 3 (December 17, 2014): 528–65. http://dx.doi.org/10.1017/s0960129512000916.
Full textHatmoko, W., Radhika, R. Firmansyah, and A. Fathony. "Water security of river basins in West Java." IOP Conference Series: Earth and Environmental Science 419 (February 8, 2020): 012140. http://dx.doi.org/10.1088/1755-1315/419/1/012140.
Full textMeyer, Helen. "Sun changes security framework for Java development kit." Computers & Security 17, no. 1 (January 1998): 58–59. http://dx.doi.org/10.1016/s0167-4048(97)80259-3.
Full textPuryantoro, Puryantoro, and Hasbiadi Hasbiadi. "Analysis of Food Security Level of Urban and Rural Households in East Java Province." Buletin Penelitian Sosial Ekonomi Pertanian Fakultas Pertanian Universitas Haluoleo 23, no. 1 (April 30, 2021): 21. http://dx.doi.org/10.37149/bpsosek.v23i1.16734.
Full textMartínez, Salvador, Valerio Cosentino, and Jordi Cabot. "Model-based analysis of Java EE web security misconfigurations." Computer Languages, Systems & Structures 49 (September 2017): 36–61. http://dx.doi.org/10.1016/j.cl.2017.02.001.
Full textPaul, Nathanael, and David Evans. "Comparing Java and .NET security: Lessons learned and missed." Computers & Security 25, no. 5 (July 2006): 338–50. http://dx.doi.org/10.1016/j.cose.2006.02.003.
Full textWen, Ze Peng, Gong Liang Li, Yi Zheng Tao, and Guang Hong Yang. "Researches on JVMTI-Based Security Enhancement Techniques for Java Software." Advanced Materials Research 998-999 (July 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1247.
Full textHan, Li Fang, Ting Ting Hou, Kun Lun Gao, Nan Liu, and Bao Jiang Cui. "Research on Java Source Code Static Analysis Based on Taint Tracking." Applied Mechanics and Materials 602-605 (August 2014): 3846–49. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3846.
Full textLi, Ai Ning, Sheng Li Hu, Jin Qing Chi, and Peng Bo Wu. "Research on Information Security Transmission Mechanism of Hospital Management System." Applied Mechanics and Materials 701-702 (December 2014): 1004–7. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1004.
Full textChoirul, Nanda. "64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java." Jurnal Terapan Teknologi Informasi 3, no. 1 (October 25, 2019): 65–73. http://dx.doi.org/10.21460/jutei.2019.31.145.
Full textPujiati, Sri, Amelia Pertiwi, Churun Cholina Silfia, Dewa Maulana Ibrahim, and Siti Hadiyati Nur Hafida. "ANALISIS KETERSEDIAAN, KETERJANGKAUAN DAN PEMANFAATAN PANGAN DALAM MENDUKUNG TERCAPAINYA KETAHANAN PANGAN MASYARAKAT DI PROVINSI JAWA TENGAH." Jurnal Sosial Ekonomi Pertanian 16, no. 2 (June 3, 2020): 123. http://dx.doi.org/10.20956/jsep.v16i2.10493.
Full textOluwabukola, Otusile, Oludele Awodele, Chibueze Ogbonna, Ajaegbu Chigozirim, and Amarachi Anyaehie. "A Packet Sniffer (PSniffer) Application for Network Security in Java." Issues in Informing Science and Information Technology 10 (2013): 389–400. http://dx.doi.org/10.28945/1818.
Full textKumar, Sunil, and Jayant Shekhar. "Cloud Deployment with Java Implementation of Cloud Data Security Algorithm." International Journal of Private Cloud Computing Environment and Management 3, no. 2 (October 30, 2016): 19–26. http://dx.doi.org/10.21742/ijpccem.2016.3.2.03.
Full textMazuera-Rozo, Alejandro, Camilo Escobar-Velásquez, Juan Espitia-Acero, David Vega-Guzmán, Catia Trubiani, Mario Linares-Vásquez, and Gabriele Bavota. "Taxonomy of security weaknesses in Java and Kotlin Android apps." Journal of Systems and Software 187 (May 2022): 111233. http://dx.doi.org/10.1016/j.jss.2022.111233.
Full textKoved, L., A. Nadalin, N. Nagaratnam, M. Pistoia, and T. Shrader. "Security challenges for Enterprise Java in an e-business environment." IBM Systems Journal 40, no. 1 (2001): 130–52. http://dx.doi.org/10.1147/sj.401.0130.
Full textMerz, Matthias. "Enabling declarative security through the use of Java Data Objects." Science of Computer Programming 70, no. 2-3 (February 2008): 208–20. http://dx.doi.org/10.1016/j.scico.2007.07.005.
Full textMeyer, Helen. "Server -based Java security products help guard your enterprise flank." Computers & Security 18, no. 2 (January 1999): 153–54. http://dx.doi.org/10.1016/s0167-4048(99)80047-9.
Full textPironti, Alfredo, and Riccardo Sisto. "Provably correct Java implementations of Spi Calculus security protocols specifications." Computers & Security 29, no. 3 (May 2010): 302–14. http://dx.doi.org/10.1016/j.cose.2009.08.001.
Full textCrégut, Pierre, and Cuihtlauac Alvarado. "Improving the Security of Downloadable Java Applications With Static Analysis." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 129–44. http://dx.doi.org/10.1016/j.entcs.2005.02.033.
Full textMartínez Pabón, Francisco Orlando, Jaime Caicedo Guerrero, Rodrigo Hernández Cuenca, Oscar Mauricio Caicedo Rendón, and Javier Alexander Hurtado Guaca. "SIM parameter-based security for mobile e-commerce settings." Ingeniería e Investigación 27, no. 2 (May 1, 2007): 56–64. http://dx.doi.org/10.15446/ing.investig.v27n2.14830.
Full textLin, Jian Bing, and Jin An Zou. "The Protection Strategy of Data Security Based on JAVA Stream Filtering." Applied Mechanics and Materials 433-435 (October 2013): 1631–34. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1631.
Full textMahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (September 1, 2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.
Full textAgboola, Rihanat Bola, Zaharaddeen Salele Iro, Jamilu Awwalu, and Ibrahim Nasir Said. "Database security framework design using tokenization." Dutse Journal of Pure and Applied Sciences 8, no. 1b (May 6, 2022): 16–26. http://dx.doi.org/10.4314/dujopas.v8i1b.3.
Full textAgrawal, Richa, Dr Brajesh Kumar Singh, and Dr Lavkush Sharma. "Cryptography based Internet Security ATM System using Fingerprint for securing PIN." Journal of University of Shanghai for Science and Technology 23, no. 10 (October 9, 2021): 369–80. http://dx.doi.org/10.51201/jusst/21/10717.
Full textAnandhiya, Anandhiya, Agus Arifin, and Istiqomah Istiqomah. "Pengaruh Ketahanan Pangan terhadap Rata-Rata Pengeluaran Masyarakat di Jawa Tengah." Jurnal Ilmiah Universitas Batanghari Jambi 21, no. 1 (February 8, 2021): 96. http://dx.doi.org/10.33087/jiubj.v21i1.1258.
Full text