Skip to main content

Java Sprach- und Plattformsicherheit

  • Chapter
  • First Online:
Sichere Systeme

Part of the book series: Xpert.press ((XPERT.PRESS))

  • 2972 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Govindavajhala, Andrew W. Appel, Using Memory Errors to Attack a Virtual Machine, 2003 IEEE Symposium on Security and Privacy, pp. 154–165, 2003, http://www.cs.princeton.edu/∼appel/papers/memerr.pdf

    Google Scholar 

  2. L. Gong, JavaTM 2 Platform Security Architecture, http://java.sun.com/j2se/1.4.2/ docs/guide/security/spec/security-spec.doc.html. Permissions findet man unter http://java.sun.com/j2se/1.4.2/docs/guide/security/permissions.html

    Google Scholar 

  3. N. Hardy, The Confused Deputy (or why capabilities might have been invented), ACM SIGOPS Operating Systems Review Vol. 22 (4) (October 1988), pp. 36–38

    Article  Google Scholar 

  4. JAAS Authentication Tutorial, http://java.sun.com/j2se/1.4.2/docs/guide/security/ jaas/tutorials/GeneralAcnOnly.html

    Google Scholar 

  5. IBM Java Security Research Homepage, http://domino.research.ibm.com/comm/ research_projects.nsf/pages/javasec.index.html

    Google Scholar 

  6. L. Koved, T. Habeck, M. Pistoia, Enabling Java 2 Runtime Security with Eclipse Plug-ins, OSGi Developer Forum and World Congress. Paris, France, October 2005

    Google Scholar 

  7. G. Kiczales, A. Paeppke, Open Implementations and Meta-Object Protocols, Tutorial, http://www2.parc.com/csl/groups/sda/publications/papers/Kiczales- TUT95/for-web.pdf

    Google Scholar 

  8. G. Krüger, Handbuch der Java-Programmierung, Addison-Wesley, 2002

    Google Scholar 

  9. M.S. Miller, J. Shapiro, Paradigm Regained: Abstraction Mechanisms for Access Control, http://www.eros-os.org/papers/paradigm-final.pdf

    Google Scholar 

  10. T. Neward, Effective Enterprise Java, Addison-Wesley 2004

    Google Scholar 

  11. T. Neward, java.security.Policy: When “java.Policy” Just Isn’t Good Enough, http://www.javageeks.com/Papers/JavaPolicy/JavaPolicy.pdf

    Google Scholar 

  12. Open eXtensible Access Control Markup Language, www.openxacml.org

    Google Scholar 

  13. M. Pistoia, L. Koved, T. Habeck, SWORD4J: Secure WORkbench Development environment For Java. ECOOP 2005 – 19th European Conference on Object-Oriented Programming, ACM, July 2005.

    Google Scholar 

  14. M. Pistoia, L. Koved, T. Habeck„ Adding Security to Eclipse, http://www.eclipse.org/equinox/incubator/security/documents/addingsecurity/ Adding%20Security%20to%20Eclipse.pdf

    Google Scholar 

  15. V. Samar, C. Lai, Making Login Services Independent of Authentication Technologies, http://java.sun.com/security/jaas/doc/pam.html

    Google Scholar 

  16. P. Thomas, Homepage, http://ptrthomas.wordpress.com

    Google Scholar 

  17. D. Wallach, E. Felten, et al., Extensible Security Architectures for Java

    Google Scholar 

  18. H. Wunderlich et al., WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook, IBM RedBook, http://www.redbooks.ibm.com/abstracts/sg246086.html?Open

    Google Scholar 

  19. eXtensible Access Control Markup Language (XACML) Version 2.0, www.oasis.org

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha Prof. Dr. .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Java Sprach- und Plattformsicherheit. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_5

Download citation

Publish with us

Policies and ethics