| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f664330c78b1dfdd-187806cd-4ead48d8-ba71b9b1-5f4db34df512a2a22dba9ec9"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, _IEEE Transactions on Software Engineering_ Volume 22, Issue 1, Jan 1996, Page(s):6 - 15. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="257a88106b0c8960-85a61170-4b7c456b-b9caba22-698f247440d468ee416d9a71"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/], Sun Microsystems, Inc2006. (2006) Available at http://download.oracle.com/javase/6/docs/api/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3be6708cfc7896d7-be751884-4ae54e3e-96deaabf-63a81b93eacd17c897316b4e"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 2000\] Calvin Austin and Monica Pawlan, [_Advanced Programming for the Java 2 Platform_ |http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Addison-Wesley Longman., Boston, (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="505fe69e46f069ec-9e31bd2f-4aa54c43-b291b970-5f62a1e62b6e617f2c3610e3"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro> \[Black 2004\] Paul E. Black and Paul J. Tanenbaum, "partial order", in _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology., December 17, December 2004. (accessed TODAY) Available from:at [http://xlinux.nist.gov/dads/HTML/partialorder.html] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b614e81492915155-d3d74ac5-439341d6-a157a004-a6ba073b0a89377131613840"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro> \[Black 2006\] Paul E. Black and Paul J. Tanenbaum, "total order", in _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, March 2006. (accessed TODAY) Available from:at [http://xlinux.nist.gov/dads/HTML/totalorder.html] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb1323afb9b8ecc0-57ae4f38-48bd4e2a-a86dab8a-f843763a3e107f4261d78b75"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 2001\] Joshua Bloch, _Effective Java,: Programming Language Guide_, by Joshua Bloch. Addison Wesley. (2001)Addison-Wesley Professional, Boston, 2001. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28314164718e9e56-4c3b3c48-46524c1c-bb97a052-3e59888654c8be2b4ca525cb"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 20052005a\] Joshua Bloch and Neal Gafter, _Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases_, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)Addison-Wesley Professional, Boston, 2005. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5e99f1c48519468-5c2ea7da-433c4d25-8d888481-74213d5bdbca3fcfe03f8020"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro> \[Bloch 2005b\] Joshua Bloch and Neal Gafter, [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/], by Joshua Bloch and Neal Gafter. JavaOne Conference., (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b173f27f66cec393-ac3cdbc1-4c7b437d-841b888f-2ae4cf00fb82e3f350a3da95"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro> \[Bloch 2007\] Joshua Bloch, [Effective Javaâ„¢ Reloaded: This Time It's (notNot) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf], by Joshua Bloch. JavaOne Conference., (2007). <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="934f6bd0baef1969-f63352a0-401e4256-a16e9ac0-116f7814ac3c959a85b45264"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa5b2203a3a0c605-39be445d-4a8e4403-89a8a1e2-626026dedb59314733c404c0"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 2008\] Joshua Bloch, _Effective Java_, 2nd editioned., by Joshua Bloch, Addison Wesley. (2008)Addison-Wesley Professional, Boston, 2008. |
| Anchor | ||||
|---|---|---|---|---|
|
| Wiki Markup |
|---|
\[Bloch 2009\] Joshua Bloch and Neal Gafter, [Return of the Puzzlers: Schlock and Awe|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5186.pdf], by Joshua Bloch, Google Inc. and Neal Gafter, Microsoft Corporation. JavaOne Conference., (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9648f989cd027be-76fe79b2-41ad4da9-acd4afe2-f779e4c7c4ceca2a5d66198e"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 2005\] Hans-J. Boehm, Finalization, Threads, and the Javaâ„¢ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference., (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="029373a8f68580a5-69354955-40a04d54-b86c9c30-ec1127c44498395b0dad65b1"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 1996\] Mary Campione and Kathy Walrath, [_The Java Tutorial,: byObject-Oriented MaryProgramming Campionefor and Kathy Walraththe Internet_|http://www.telecom.ntua.gr/HTML.Tutorials/index.html], (1996)Addison-Wesley, Reading, MA, 1996. |
| unmigrated-wiki-unmigrated-wiki-markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb368d4a9a6160b9-1080d984-44da4819-848886e5-4a7bd9d9d287ba4ac9cada8b"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 1988\] CCITT. _CCITT Blue Book_, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework., International Telecommunication Union, Geneva., (1988). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e07ba693b112bc39-f80f7315-43ba420c-8d21a5f3-7f49686aa4abfb8b1c52a953"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 1999\] Patrick Chan, Rosanna Lee, and Douglas Kramer, _The Java Class Libraries: Supplement for the Java 2 Platform_, v1.2, second2nd editioned., Volume 1, by PatrickPrentice ChanHall, Upper RosannaSaddle LeeRiver, DouglasNJ, Kramer. Prentice Hall. (1999)1999. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3500b66fa11c92a4-1579a28c-4463410a-99969cdb-dfb387930f563932f1264470"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 2007\] Brian Chess and Jacob West, _Secure Programming with Static Analysis, by Brian Chess and Jacob West. _, Addison-Wesley Professional. (2007), Boston, MA, 2007. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="575bae932169f96e-38aa94cd-477b4208-b17cb574-8995663d9ac1240dad553b57"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 2005\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava, 2005. (2005) Available at http://onjava.com/pub/a/onjava/2005/01/26/classloading.html. |
| unmigrated-unmigrated-wiki-markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07c18d376ea7d269-7d5d4189-480847b0-926cad92-ff64d0a8aea3c7718ee022d7"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro> \[Cohen 1981\] [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, vol.Volume 14, issueIssue 10, (1981). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f7e33e3120523ce-60128fc2-437147aa-a7e999bb-cff58425da99b041045f3cb1"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro> \[Conventions 2009\] [Code Conventions for the Java Programming Language|http://java.sun.com/docs/codeconv/]., Sun Microsystems, Inc2009. (2009) Available at http://www.oracle.com/technetwork/java/codeconv-138413.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20c7d94d0c115eae-3dd7394d-4c184cca-a6e2a999-385e2097948e95c9ec542cb1"><ac:parameter ac:name="">CVE 08<11</ac:parameter></ac:structured-macro> \[CVE 20082011\] Common Vulnerabilities Vulnerabilityand ExposureExposures, MITRE Corporation. (2008), 2011. Available at http://cve.mitre.org. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73b069fd74ed47df-38cf6adc-426b4053-a206a8bd-3d95ce511dcfcd6320489003"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 2007\] John Coomes, Peter Kessler, and Tony Printezis, [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf], byJava JohnSE Coomes,Garbage PeterCollection KesslerGroup, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference., (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f100df61ff30e18f-7d2eab65-42f94705-b158b2c3-e20d3d3bf89fb19da0057e24"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 2004\] Cay S. Horstmann and Gary Cornell, _Core Javaâ„¢ 2 Volume I - Fundamentals_, Seventh Edition by Cay S. Horstmann, Gary Cornell.7th ed., Prentice Hall PTR., Boston, (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41b5f852cd452f3a-699712ce-43e24aea-9c29bdb5-1c0c4170bee4915043cb778b"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 1995\] " Ward Cunningham, The CHECKS Pattern Language of Information Integrity", in _Pattern Languages of Program Design, by Ward Cunningham, edited by_, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley. (1995) Professional, Reading, MA, 1995. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="651252c613f685ad-f499d787-464c4798-82adba7b-198d3af169ab728b5cfd3d85"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 2000\] Michael C. Daconta, [When Runtime.exec() wonWon't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. DacontaJavaWorld.com, JavaWorld2000.com. Available (2000)at http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c663943952ab2cf8-38ae3a9a-40454d2a-b716bd30-3e1bec698f7e9508c781f2bb"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 2003\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson., _More Java Pitfalls_, Wiley Publishing Inc. (2003), New York, 2003. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6cf875321d142e4-b81bc9da-4c574e55-8f20af30-d5ceb70f94070a744b1758f9"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 2004\] Ian F. Darwin, _Java Cookbook_, by Ian F. Darwin (2004)O'Reilly, Sebastopol, CA, 2004. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3334d0df149e30e-06b6f7a8-4cef4281-87c6b373-1160aad578a659130dee3b22"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro> \[Davis 20082008a\] Mark Davis and Martin Dürst, [Unicode Standard Annex #15, Unicode Normalization Forms|http://unicode.org/reports/tr15/], by2008. MarkAvailable Davis and Martin Dürst. (2008)at http://unicode.org/reports/tr15/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f3c10fbf6248d39-20efa20d-4b1e4320-9e1ab0eb-905c02ed2eea2e1fd135c4f0"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro> \[Davis 2008b\] [UnicodeMark TechnicalDavis Reportand #36, Michel Suignard, [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/], by2008. MarkAvailable Davis and Michel Suignard. (2008)at http://unicode.org/reports/tr36/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec626d8b7273bcad-5730d539-4a6a4c12-9a91ba33-9d7e86e439bddd3bd61687d4"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro> \[Dennis 1966\] Jack B. Dennis and Earl C. Van Horn., 1966. Programming semanticsSemantics for multiprogrammed computations. Commun. ACM Multiprogrammed Computations, _Communications of the ACM_ Volume 9, Issue 3, ( March 1966), pp. 143-155., DOI=10.1145/365230.365252 [http://doi.acm.org/10.1145/365230.365252]. Available at http://doi.acm.org/10.1145/365230.365252. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2646af02a2ce37d-801c590d-419b441f-81919a7e-9113d4c5fffabcab7eb22452"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 2006\] [Build Security In|https://buildsecurityin.us-cert.gov/], U.S. Department of Homeland Security, 2006. [BuildAvailable Securityat In|https://buildsecurityin.us-cert.gov/]bsi/home.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5465789f4301cf03-67df4399-40574e4b-9b4bbafb-d40c2f2a8d6dc54ee76fb089"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro> \[Dormann 2008\] Will Dormann, [Signed Java Applet Security: Worse than ActiveX?|http://www.cert.org/blogs/vuls/2008/06/signed_java_security_worse_tha.html], by Will Dormann. CERT Vulnerability Analysis Blog. (2008), 2008. Available at http://www.cert.org/blogs/certcc/2008/06/signed_java_security_worse_tha.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="641feba88b49c3a3-eecc2c06-45b04fa6-a3d88b8d-76b9fe002ae5c7a345b4a7bc"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 2003\] Gunjan Doshi, [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003), ONJava.com, 2003. Available at http://onjava.com/pub/a/onjava/2003/11/19/exceptions.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10006ffc158e5ea6-f217241b-43d4475f-bde5892f-ea189457f9b6fb9828bbcd56"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro> \[Dougherty 2009\] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi., [_Secure Design Patterns_|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]., CMU/SEI-2009-TR-010. (2009), Defense Technical Information Center, Ft. Belvoir, VA, 2009. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="004748ccc3625b05-6231e247-4767445e-b6a380b9-482370530a3c2d8427407666"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 2008\] The Eclipse Platform, (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c04be9f0d77c2bf0-7b069b3d-489944f1-8813856b-50e20da6af8946287f38dad1"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro> \[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006)2006. Available at http://download.oracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6fc673a84d09949-91318853-4d6e40a3-8f08a593-81e1b055959f3b39224f00a7"><ac:parameter ac:name="">Enterprise>EMA 03<2011</ac:parameter></ac:structured-macro> \[EnterpriseEMA 20032011\] [Java SE 6 Documentation, Extension Mechanism Architecture|http://download.oracle.com/javase/6/docs/technotes/guides/extensions/spec.html], Sun Microsystems, 2011. Available at http://download.oracle.com/javase/6/docs/technotes/guides/extensions/spec.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72265771-6c50-41a1-ad18-cb534dfbc7c4"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 2003\] The Enterprise Best Practices, by the O'Reilly Java Authors., _Java Enterprise Best Practices_, O'Reilly. (2003), Sebastopol, CA, 2003. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41c306fc50c04800-d394314c-42be4fc4-87c299fc-1a557f33d4ca7e0b2b429ac3"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC)., (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="037f7b46fd56643f-44de8f4a-47814d6a-b822bab1-41d78a6285c3004929532e72"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro> \[Fairbanks 2007\] [Design Fragments|[Fairbanks 2007\] [_Design Fragments_|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html], Defense Technical Information Center, Ft. Belvoir, VA, 2007. Available at http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05048429fdcba0f6-e4d399bb-493c422e-b7d3836a-e1293170d19fd70f30f3a7cf"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html], (2008)2008. Available at http://findbugs.sourceforge.net. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="994a603e5d5e85b3-6cb777df-4edb417d-a6749504-af4742d669612779f3fc645a"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) _JDBC API Tutorial and Reference_, 3rd ed., Addison-Wesley, Boston, MA, 2003. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f29fd6df00bf4cd1-48fca42c-46ab49b1-b02c98f5-7548d1b4a026ebd791e933ee"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 2005\] David Flanagan, _Java in a Nutshell_, 5th editioned., by David Flanagan, O'Reilly, MediaSebastopol, Inc.CA, (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5021fcc7a7f38f01-551a5897-454541df-806f90d2-356e4e06d534e3630ad26266"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro> \[Forman 05\] Forman, Ira R. &Forman and Nate Forman, Nate. _Java Reflection in Action. Greenwich_, CT: Manning Publications Co., Greenwich, CT, 2005. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dc80b7414636fe3-3d34979a-4a694426-8b94857a-dc86cbdefe029988173c4007"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro> \[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html], Java/JSP, Fortify Software. (2008), 2008. Available at https://www.fortify.com/vulncat/en/vulncat/index.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dc90ccaf9b5b408-17330cd9-44404a8e-8569939a-372b847fd30695359e9a1a7a"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 2001\] Joshua Fox, When is a Singleton notNot a Singleton?, bySun JoshuaDeveloper FoxNetwork, Sun2001. DeveloperAvailable Network (SDN) (2001)at http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c8712efcdd35468-7dd67fbf-4c5d4f23-b649bb72-910b29c7d9997d400179c011"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008. (2008) Available at http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5dac4cd305a3d194-5d79abf1-414749c6-ad5a9d16-5054b19a5ca5c2ffc25d0be9"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro> \[Gafter 2006\] Neal Grafter, [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006)2006. Available at http://gafter.blogspot.com. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c6c3ca32c16f7ab-e3fa4ac8-4899414d-8b10ba96-777b61ebd57a8bf1234278a2"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides., _Design Patterns: Elements of Reusable Object-Oriented Software_, Addison-Wesley Professional, Computing Series. (1995)Boston, MA, 1995. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea01596567e6241e-ae9407d5-44954e26-800886d0-c13bfedd1532d1334045bf22"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro> \[Garfinkel 1996\] Simson Garfinkel, Simsonand &Gene Spafford, Gene. _Practical UNIX & Internet Security_, 2nd Editioned. Sebastopol, CA: O'Reilly, MediaSebastopol, AprilCA, 1996 (ISBN 1-56592-148-8). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc6ef183aa847bf0-8a220213-4e094503-81c08542-09205c3c280f2677c8dd7d3f"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 2001\] Professional Java Security, by 2001\] Jess Garms and Daniel Somerfield., _Professional Java Security_, Wrox Press, Ltd.Chicago, (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="849221efc08e8a64-3b283819-492344ff-95968384-a10567ab0f1b42068f541be1"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro> \[Goetz 2002\] Brian Goetz, [Java theoryTheory and practicePractice: Don't letLet the "this" referenceReference escapeEscape during constructionConstruction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002), 2002. Available at http://www.ibm.com/developerworks/java/library/j-jtp0618/index.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9adff2173231a6b6-2922f511-41e840b8-a2b98f39-7df1c26e367c99512a1b9f83"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 20042004a\] Brian Goetz, [Java theoryTheory and practicePractice: Garbage collectionCollection and performance|Performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], IBM developerWorks (Java technology), 2004. Available at http://www.ibm.com/developerworks/java/library/j-jtp01274/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1c7d6bdf0bfc6e8-8db5bb4e-49b74a00-93d99d65-45d2b426331d617c8eabc9c8"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 2004b\] Brian Goetz,[Java theoryTheory and practicePractice: The exceptionsExceptions debateDebate: To checkCheck, or notNot to checkCheck?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology), 2004. (2004) Available at http://www.ibm.com/developerworks/java/library/j-jtp05254/index.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26eb488b036fd6b4-d0a64b8c-4c654bac-b80bab94-1611faf6b6898dff8b93110f"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro> \[Goetz 2004c\] Brian Goetz, [Java theoryTheory and practicePractice: Going atomicAtomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], byIBM BriandeveloperWorks Goetz, Principal Consultant(Java technology), Quiotix2004. IBMAvailable developerWorks (Java technology). (2004)at http://www.ibm.com/developerworks/java/library/j-jtp11234/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d373d7faf1b775cd-8da9fbec-4c5b4166-bea8b85b-f102a95f6797a81424dccd87"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 20052005a\] Brian Goetz, [Java theoryTheory and practicePractice: Be a goodGood (eventEvent) listenerListener, Guidelines for writingWriting and supportingSupporting eventEvent listenersListeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology), 2005. (2005) Available at http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bead0885b5528cb5-84f78cd8-4e1e4916-807399fa-341f2960544680477ac2e561"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro> \[Goetz 2005b\] Brian Goetz, [Java theoryTheory and practicePractice: Plugging memoryMemory leaksLeaks with weakWeak referencesReferences|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005), 2005. Available at http://www.ibm.com/developerworks/java/library/j-jtp11225/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf655feadfc6da60-78c021fc-42994a40-9c94b839-b464ce09ec750291958f679b"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 20062006a\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea., _Java Concurrency in Practice_, Addison -Wesley Professional. (2006), Boston, MA, 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd874ab102c79689-28b13717-43a646aa-bd20b5a0-6f7b53a0f2b23289f62e8429"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 2006b\] Brian Goetz, [Java theoryTheory and practicePractice: Good housekeepingHousekeeping practicesPractices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006), 2006. Available at http://www.ibm.com/developerworks/java/library/j-jtp03216/index.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b4eec64eb257314-3233e1f3-40a749f3-9510873b-2959e3c069a69a8412d46ec4"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro> \[Goetz 2007\] Brian Goetz, [Java theoryTheory and practicePractice: Managing volatilityVolatility, Guidelines for usingUsing volatileVolatile variablesVariables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems..html], IBM developerWorks (Java technology), 2006. (2006) Available at http://www.ibm.com/developerworks/java/library/j-jtp06197/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc79c6f1a82cd82a-bbfa18ff-4a694c0e-aa77a027-ff855950bcd3733a78afbcfd"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 1991\] David Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]., Sun Microsystems, Inc. March 1991. (1991) Available at http://download.oracle.com/docs/cd/E19957-01/806-3568/ncg_goldberg.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c22c9890f286e20-b7abf840-420f417f-9c6ba97d-961322c626d6b3fbb1fda189"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 2003\] Li Gong, Gary Ellison, and Mary Dageforde, _Inside Java 2 Platform Security: Architecture, API Design, and Implementation_, 2nd editioned., byPrentice Li GongHall, Gary EllisonBoston, and Mary Dageforde. Prentice Hall, The Java Series. (2003)MA, 2003. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f8ee2cb24ffc8e7-17d051e3-42854171-8066a6ce-2917909ec90b1ff5248bc747"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro> \[Grand 2002\] ] Mark Grand, _Patterns in Java_, Volume 1, Second2nd Editioned., byWiley, MarkNew Grand.York, Wiley2002. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a16f7245b33646ff-a5d95e7a-499d4566-8f8b8ffa-1002c273cd114ac9ad1a7bfa"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 2000\] Todd Greanier, [Discover the secretsSecrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000), 2000. Available at http://java.sun.com/developer/technicalArticles/Programming/serialization/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f19699a50e02c170-d594babe-45bc4457-92229c80-def352667619f452c87a04c6"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 2008\] Roedy Green, [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html], by Roedy Green. (2008)2008. Available at http://mindprod.com/jgloss/jgloss.html. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e0b8e805c45270f-8dcd1884-42da46ae-ae4989e8-1e26126affe38a2e25d902a0"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro> \[Grigg 2006\] Jeffery Grigg, [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses], by Jeffery Grigg. (2006)2006. Available at http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f65d6b8080b0db21-5abf06f2-421946a5-a45788ea-7b2d4c451e3e1300e042101c"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro> \[Grosso 2001\] William Grosso, [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001), Sebastopol, CA, 2001. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67cc4f84902b7053-b113c37d-465a4e75-8aa5bf18-a06b3ffde22e963460bf5b69"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 2005\] Satish Chandra Gupta and Rajeev Palanki, [Java memoryMemory leaksLeaks - Catch meMe ifIf youYou canCan|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by2005. SatishAvailable Chandra Gupta and Rajeev Palanki. (2005)at http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5672a71e438c0b0c-60f58ea9-4b6e4177-9ba897cb-414b050ea10573ade810a058"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro> \[Haack 2006\] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by2006. ChristianAvailable Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)at https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca7cb9b0dc409482-e4424250-4f2c4b3a-bbd3b4c3-25870bb9d303845c0b1c4ccc"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro> \[Haggar 2000\] Peter Haggar, _Practical Javaâ„¢ Programming Language Guide_, by Peter Haggar. Addison-Wesley Professional. (2000), Boston, MA, 2000. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7b137bef8868438-d5c1c548-40804597-8bd580a0-e55886cce3f4ac454bc25d0d"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 2000\] Stuart Halloway, [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e06d77277723f2f6-40e7a614-41e14018-a376aa4e-897f58d3b2ac8f0a5b5a2e65"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 2001\] Stuart Halloway, [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb1ddad57495156c-ff716523-40744c64-a7efb1ec-2e291c05570964e08f368289"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 1997\] Java Secrets by Elliotte Rusty Harold., _Java Secrets_, Wiley. (1997), New York, 1997. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f1ef0f2e60f3046-4232417c-475c434d-b9988d29-087f74291242419b564dd816"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 1999\] Elliotte Rusty Harold, _Java I/O_, by Elliotte Rusty Harold. O'Reilley. (1999)O'Reilly, Sebastopol, CA, 1999. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40732bcf0f6f7a48-b562df4c-4a434a7b-a078a405-29622c1f0dd491048adba1cd"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 2006\] Elliotte Rusty Harold, _Java I/O_, by Elliotte Rusty Harold (2nd Edition)ed., O'Reilley. (2006)Reilly, Sebastopol, CA, 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64dd824b87271c0a-7241eafd-443b41e7-afeaa585-98db3af3a82ec319b5a7ac25"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro> \[Hawtin 2008\] Thomas Hawtin, [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa1e878936a336ca-89bf9505-488e4a57-a8ce9e4d-9ac0829b0800a7071a3e12f3"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro> \[Heffley 2004\] Heffley, J. &Heffley Meunier,and P. “CanMeunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?†_Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04)_, - Track 9, - Volume 9. Island of Hawaii, January 2004. IEEE Computer Society, January 2004. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8cfe7a3fc295f99-0362a04f-418944b4-a824a7db-2e4db120e6d30cd288eb782a"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 2003\] Kevlin Henney, [Null Object, Something for Nothing| Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], 2003. Available at http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de015c5732a6667b-2a123cda-46c842b9-80818d9c-3da81aa54f7bce1a8f78f1cf"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro> \[Hitchens 2002\] Ron Hitchens, _Javaâ„¢ NIO_, by Ron Hitchens. O'Reilly. (2002), Sebastopol, CA, 2002. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b06e470a1f043ea-1753a98c-4ef14438-92718569-631acb6e0e585b8fd105001b"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro> \[Hornig 2007\] Charles Hornig, [Advanced Javaâ„¢ Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference., (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="913fbf4a531b30ae-7af957f0-4dc745b0-ac7082c1-4648cafa4bae21f99763ed6d"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro> \[Hovemeyer 2007\] FindingDavid moreHovemeyer nulland pointerWilliam bugsPugh, Finding butMore notNull tooPointer manyBugs, byBut DavidNot HovemeyerToo and William Pugh. Many, _Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysisAnalysis for softwareSoftware toolsTools and engineering.Engineering_, (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="635ba4732b18abb3-3f741009-434d4fd3-bb68bd4e-97484c19f41b68d35d0402b5"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro> \[Howard 2002\] Howard, Michael, &Howard LeBlanc,and David C. LeBlanc, _[_Writing Secure Code, 2nd ed. Redmond, WA:_|http://www.microsoft.com/mspress/books/5957.aspx]_, 2nd ed., Microsoft Press, DecemberRedmond, WA, 2002. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff5cc873fcf46afc-00439745-4a99417c-8302b66c-663462e51fb09ecede69ae47"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro> \[Hunt 1998\] J. Hunt and F. Long, Java's reliabilityReliability: anAn analysisAnalysis of softwareSoftware defectsDefects in Java, by J. Hunt and F. Long. _Software IEEIEEE Proceedings._, (1998). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ee8f5a31bbd6d0e-37c850b5-47ee49e1-a79eadde-8614e913915ac26df6731196"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] _Analysis techniquesTechniques for systemSystem reliabilityReliability - Procedure for failureFailure modeMode and effectsEffects analysisAnalysis (FMEA)_, 2nd ed., (IEC 60812). IEC, JanuaryInternational Electrotechnical Commission, Geneva, 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="899f1a8e97196848-aa331576-4bab4103-9cca9591-9bcfb52e909ef09c5b3d905b"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE., [_Standard for Binary Floating-Point Arithmetic_| Arithmetic|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. Available at http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93ca8d436ef9d330-a4ddf2be-4bde4c36-a483b787-e4e5ec3f6a1b2b7a7c2d8b67"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24772:2010\] ISO/IEC TR 24772. _Information Technology_ --- _Programming Languages_ --- _Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_, October, 2010. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dfb26d88418436b-637a78c4-420f4e82-b10f9eee-1a52c39ac4e32b5a13f3aa4c"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 2000\] Javaâ„¢ 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc2000. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98b8bef205300d00-986da6eb-459b47f2-80e5b4cc-c94f1dbdf44cce70fecf0c27"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro> \[J2SE 2011\] Javaâ„¢ SE 7 Documentation, [J2SE Documentation version 1.7|http://download.java.net/jdk7/docs/], Oracle Corp., (2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10e7f7f3986c2b10-82de4d28-485f4891-8520a3a3-92baa5658efa1b8d3693d0f7"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc2000. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa627726f91557e9-49ce9727-4d034e08-8352be4a-0f011880574c13a43a6cdb8f"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro> \[Java 2006\] [javaJava - theThe Java applicationApplication launcherLauncher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc2006. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a6295be1fbd8c46-ddc12f66-41b94ab3-af68b9a3-5f569b6c3a6704bcc29a826a"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. IBM Corporation. (1999), _Java 2 Network Security_, Prentice Hall, Upper Saddle River, NJ, 1999. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b06f7173dc7cd6e8-abcae7ac-40794916-bb609e18-aa3ff506e1d52602d59241b0"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 2004\] \[[\] Oracle, [Generics|http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc2004. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="495ede8eb0b1a451-fe5af550-4f73471e-84e0927a-6c84810596796aefc2a005b6"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong, _Java Threads_, 2nd ed., O'REILLY. (1999)Reilly, Sebastopol, CA, 1999. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e074a5405bb5ffe-6a87f5c0-4a984cd3-a7b48c70-777700a691a6e2e69a6925d2"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 2004\] JavaScott ThreadsOaks (3rdand Edition)Henry byWong, Scott Oaks and Henry Wong. O'REILLY. (2004)_Java Threads_, 3rd ed., O'Reilly, Sebastopol, CA, 2004. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4833d326aafb117f-1208af0a-44af409f-85e781b4-c14e5a2778479ba610a6c289"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 2008\] [Javaâ„¢ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 DecDecember 2008. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df0158d1989f7d22-a5f87536-491741f1-866db688-071dd3d889fed1e5f511b65d"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The _Java Language Specification._\|http://java.sun.com/docs/books/jls/index.html] (2005), 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="369546dab33573e6-fd0442e0-49884538-b0a79f81-fef6c6c4ae41f90579cbb44d"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13787bf5b5987d1f-8da99edd-46594263-8deab1e4-5b5e6a37fe2700573366bea7"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fdd4d70fbf48396-6f7ee619-44804e16-9cb6889d-e4be564c52c5441d7d851c9d"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7cae171233accd6-455e5c91-4a384f6a-a96da19c-168c7e7adae6e7ef84fa43b2"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro> \[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c360fb5a8d7fdd25-5208bfa2-40f74e7a-bebc8039-f7b33850df8861c43c22131b"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="adb7450964741e36-9608da0a-49d84497-a6ee86ff-2906f995023f1494d962c444"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro> \[JPL 2006\] The Javaâ„¢ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9cb99fa016889c8-4ed88100-4d2d4949-92c19c9f-189447404f95eacd98268cbc"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro> \[JSR-133 2004\] [JSR-133: Javaâ„¢ Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c11fe9c87a05be1b-f9a3c23c-493347ee-933bbfc1-c4cf7369d76ea17e54d30348"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c68d2fdbe5999389-692eda8f-440e4a90-9093a817-5ccb764bd4346e5b0182751d"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="668c02500dd75bac-cd1e25b6-4e51458a-ae549d88-e0a8c804b7077724379275ad"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro> \[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b160a0b2fdbd9a67-127237b3-4c364a65-87c2b018-a71640327615395e5823bb96"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5981a3638301ef7-a5e7b7e2-45344e2e-a6698729-55ee35928e9b86dd9e9c62a1"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f34ed5801764b206-a9c677fc-4ee3443f-9bb2a089-6ce58f291036145e8f272ba9"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro> \[Knoernschild 2001\] Javaâ„¢ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001) |
...
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe11d64f2d4a1635-7bd6b7ef-42f641d3-9b1886ca-7bb7a71710b30edc643777c1"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="910ad717c9f32fb0-e1337979-4a744247-8784b052-50aed5a3384e49a368c5e298"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21d053c0f91e1e87-1e172ab0-44964bba-b6b3914c-acb9112379c3678b2d1be3d2"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro> \[Lea 2000b\] [Correct and Efficient Synchronization of Javaâ„¢ Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3093751af706efce-594d00c2-414a443e-b7d5ac27-ff7ee23f1fc5d1d1716e63bd"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro> \[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7111861c0d39fe7e-1f03fed3-43e74b04-a9feb33f-d826599b3b121c8fc520bc63"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro> \[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39346ab8430f8c99-fd2908b5-45464b09-bb9bab4f-d2e075dbe7c4cf89cc70d7c4"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 1997\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaa8d156c010c82e-8d12ab19-419b4f10-a52b968d-dbdf787b65670f531351b83b"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro> \[Liang 1998\] [Dynamic Class Loading in the Javaâ„¢ Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86c69ded36ffa61a-4d5b0f76-49494b1c-946eb41d-ba109ede20c4c8d32e372579"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro> \[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f7cf437690c7027-a2fa764f-4bae4937-a60989f1-dfed4397b854000c8efcec20"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c67a74072012c75f-ad4c2b73-47b246c9-a6649da4-b10c8b2a41f3742109ca2308"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="743f276157901503-89d3f833-446d42a0-ab51b123-9c624202ce32979f773fc213"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro> \[LSOD 02\] Last Stage of Delirium Research Group. Java and Java Virtual Machine Security. Poland: Last Stage of Delirium Research Group, 2002. [http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf]. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44d235111575d102-a0445ef1-4b204fd4-8939b472-0c88dfc7ecbc3d2700731ef1"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e69a0e5655fa12f2-472511ce-47d940a8-b1e89f47-75fb596f35ba66f9419eaadc"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="558261ed177b02a4-2b736564-4ee44242-96aca6aa-2d35b83c74719ff53300b85e"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro> \[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="478c079294011c40-f545f7cb-4b9f4644-89c2bb3f-8c20953fe25ae92c302cdd24"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro> \[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="136c459a6941edf7-04761b53-432f48f7-8c25b1c1-406c8f7b746531459a762f7e"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro> \[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06d85f148b326283-30833792-4aec465e-ae619550-2011253fb7d906c6aaad75f6"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro> \[Manson 2006\] [The Javaâ„¢ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e4eccbd1f40c603-78466eab-400742f2-bf39bdc4-7be23cb0f83b06a810914f76"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro> \[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e261ddac74ba8cfa-30eeecfd-4c454bc2-a9d48d8b-4d75f6df524a9b7519ecd1f3"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b1ce38c6e775d63-23c2a56e-414746c1-b4eb975a-83e7de5b1a67219de54a3207"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a83a638469dafec7-c8918c37-43aa4101-8a239a89-155e947b361118589e3fedeb"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward W. Felten, JavaWorld.com. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d20339fb8b75bec6-1e8873f5-40944574-bd378120-b540711a6ab9f8f53b5caf2a"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro> \[Mettler 2010A\] A. Mettler, D. Wagner, and T. Close. Joe-E: A security-oriented subset of Java. In 17th Network & Distributed System Security Symposium, 2010. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc4fa7dc7f25f040-c5fdb48b-40f844d0-86c5aeae-8178e1a9025a4d5317e5ed5d"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro> \[Mettler 2010B\] Adrian Mettler and David Wagner. 2010. Class properties for security review in an object-capability subset of Java: (short paper). In Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, New York, NY, USA, , Article 7 , 7 pages. DOI=10.1145/1814217.1814224 [http://doi.acm.org/10.1145/1814217.1814224] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc66569a17455827-b9a5195c-4dc34a58-b436b3d8-3fe20fe1abd5c592a4589891"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro> \[Miller 2009\] [Javaâ„¢ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b53c7957dcda4429-0f68c3d8-4c084b4c-a1a98231-731742f22306970ad29467fa"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro> \[MITRE 2011\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5113e990984ee737-921376b2-47774f04-b71ba0be-029eead437e5d50490f9711e"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1488514151b1002-81f51440-48824790-8e849b39-bb328dd453a61ffaa007da8c"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro> \[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8194ce3be6da5274-e3a3cd12-453b4ade-b6a19185-dbe5e8e6ff30f0d457b33042"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro> \[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30de45c89f2a8c11-97f21c95-4e1841e7-8b308ad3-393a974e5e7a975d52f589c1"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b066b01dfe99fd7-2f15d9b6-4ac74896-8a7ebf00-7d4a767b443ce60755733afa"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro> \[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e7cb868c38d66e1-3170d554-46134ef1-b411a8d5-d91402ec5b2b1c9702152632"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf4359340bb36700-9dc5a3d1-43f9489f-b0f38cde-0539cdd291ed1b04af797ee8"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 2006b\] [Javaâ„¢ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4437704d4b36d68-35a55464-4b9f4873-9b84a7ce-a264b898beeeeecba623e5db"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro> \[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b18e479ff0f8fda-460854a8-4d7b4fd6-81088246-d559a4a57c90efc4869bc12e"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a31837f67159605-cdff56a5-458c4eeb-a850a869-2a561bbc63c087281e488738"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d610f00cbd9a0f82-13de9fff-4a674c63-83abbc63-031f15b19b2a6ebc122d487d"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1e60bc9e1679ec2-6c5c9c06-4e224a52-bc638565-1a1301d557f6c977e5b74157"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d95cf84e6c24a76f-09786931-47724ebc-8f85a635-95dc01b7ecf72e7995ba5cb7"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro> \[Open Group 2004\] [The Open Group Base Specifications Issue 6|http://pubs.opengroup.org/onlinepubs/009695399/mindex.html]. The IEEE and The Open Group. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aef28ecbe625acbe-bb6e1d30-42524631-a0bbba61-37bfeabe0cb4f24443935bdb"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro> \[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48a15648d2ffac20-9f46efcb-4da345f0-8e348706-4e2b8b4b59bbbc0b31f6d047"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af539013c0f3dea7-679318a0-45494911-bbdcb420-54d33876ad4d6f93e477fa43"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro> \[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5719aaac749d2b0e-4562d5b0-4cbd455c-8f238e5c-51f26279adb1719de88a3a31"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="208014fc718f4635-65b35ceb-4b334683-83429122-0ea8d420448a8edfb288a8b1"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro> \[Permissions 2008\] [Permissions in the Javaâ„¢ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5070b04ab0fed6a-fffd6fb0-45a94e0c-bd4a95fb-a798855340552a633d59ede3"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39241ce3d703ec7e-b5bfab71-476b4be0-8939a867-1cc210037214f5525122b56b"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf4414d8b444bb7f-906eff01-4684476d-af12a056-cb525928be7753625f7f6645"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b981c711e0d2bf11-500f0fbf-4c4c4232-b2bc9184-6b4d3244fc277e10e0793e23"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37c3ca2fe5572bc0-30b75756-4858482f-9860a8a0-8d83916cf23b9ecd3856e704"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro> \[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85619b443aaf3718-0cca744c-42db4333-9cc88957-22e51e3c3151dc06cbacf59b"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0221c7a20c45701c-1001e428-41484050-823eb596-cc60eebe3f4a0a672bf5ff51"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro> \[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df3d18a5d2eb7deb-bd79af7f-4bae462d-bf2e9602-639c225661163ca5de64fa6e"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro> \[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a67f3d5c4dac55c6-ae1473dd-46824987-9233be46-c1b77045b65ff9bbf6feeab3"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2284a5216bd06e9c-541844ef-4e9b473c-931caece-d7bd66e43367075bd722eb52"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro> \[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77501e2f29041fb1-54115b3f-48e74d87-94509ee5-03c1a4d3db7b82807c618eeb"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro> \[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d09125f804c90f40-0d12e5a2-420b41e1-877b92c0-a48c7b16bf470b68b3df2e51"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="787b398f31485ddc-32de66d2-4a0342ca-b321a0ea-b13ea8b1d21d48259fcb570c"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9a8d54644d06631-24ff5c32-4c6c46f9-aa369743-d9b1d718cbe88a0b1d5aa33f"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a1cc711c8ef31db-42b5a2de-45a540b7-94288109-ee3c5f4c44f0bd4a139d3383"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8410808f6754360-8db391c3-41c64421-83d08842-40784c925c7aaa57e4d6a4ea"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro> \[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56bda111a57feb9a-0cf4be62-43eb4433-b320ab7f-f62e26d6adc6e1bbed985d9d"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfef56fd8936bc59-3d373ca9-414d4523-98fd9a1d-178c5282cc8c3606ea9cec0a"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro> \[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="315af73f7e54a3ff-0f4dbc74-445241b7-b7f68397-dffbc757df6cdeaec604fd15"><ac:parameter ac:name="">Schoenefeld 02</ac:parameter></ac:structured-macro> \[Schönefeld 2002\] Schönefeld, Marc. “Security Aspects in Java Bytecode Engineering.†Blackhat Briefings 2002, Las Vegas, August 2002. http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-schonefeld-java.ppt. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b04b2a4da6bbc3c-ebf8acd0-46e14593-8c28bb9e-ec4d1ff65ea905a0aee32f35"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro> \[Schönefeld 2004\] Schönefeld, Marc. Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28d1095c7ce806ef-dca9d369-4d774de9-a73fa164-dc49e0daf589732f34995987"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dccb0bd5e017f616-36000d74-44694a1f-b470b5fd-7f5ab457c016d0435ff65db6"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2e41ba944c6de52-eda26242-44f34f02-807aa409-0f4078c5e2e40c939d47eb14"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5554014050a09d08-1105f4f0-48a744a4-b105ba81-a46fcd10dfe21fe4dd3de04b"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 2005\] Seacord, Robert C. [_Secure Coding in C and C+\+_|http://www.cert.org/books/secure-coding]. Boston, MA: Addison-Wesley. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a2a6a4b6f932501-c2fef36d-4e7f4843-92c7bea7-5ec28187bba581c173379907"><ac:parameter ac:name="">Seacord 2008</ac:parameter></ac:structured-macro> \[Seacord 2008\] Seacord, Robert C. _The CERT C Secure Coding Standard_. Boston, MA: Addison-Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b7558849a00063a-8a31876c-46f04bae-b303b61c-056a5bd8042f93e5f370062b"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6739dcb3b1269b99-9e3a764c-4d6f48c5-b4b3b596-5f02fccc714ca5eb37989c6f"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro> \[Secunia 2008\] [Secunia Advisories|http://secunia.com/advisories/]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="507c1183710a4ac6-7be06052-48fb4d57-b1ba90b2-d93dbcfed1304f4b06136851"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c34cf1726b8fa669-9a0959c0-434f4a6e-90719ebd-7d0fda14c632207ebcf0675f"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cee9cc65e10ee4bd-c1f6dd47-49304afd-8a21bd57-860194149488fa202b66be38"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro> \[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82d9e2519ac10280-ebe9b2c3-47274b3b-a3b88d29-a6ac75e379be779b47888bc7"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec403d696223e68d-dbffe3b7-4b51433f-9395914c-2f0d110b6e542cbd4aef9ae9"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro> \[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e62bb038f7a4cffa-201124aa-4844460d-92faad7b-dcb8fe0ab7ae1a40543e1df6"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9032e26a90e2fc6-8f98019a-40d54fd8-a43db9b1-fe123c389239c7dff8162e75"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro> \[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="248435e027d89a2a-08dfbe6b-405942c7-ab8e93b2-c7ba762dcc887d6ba2736afa"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro> \[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4eee7fa6fae6f447-d394093b-414941fd-b066a25c-a83f4b366751d50ebd802b16"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro> \[Sun 02\] Sun Microsystems, Inc. Reflection. [http://java.sun.com/j2se/1.5.0/docs/guide/reflection/index.html] (2002). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52e59ae753538956-4f74817e-4f834d4a-8b249e0c-56dcdeadf6702ef826964af9"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro> \[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b01d5e16186bd1b-894d997b-465d4db4-b1149c13-42c8a8570f1a3fa30e38b191"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="502475ffb0f0af3d-947647f6-444f4887-9ff2b8aa-d55ea238b94e759f26d9d8b4"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro> \[Sun 04a\] Sun Microsystems, Inc. Java Management Extensions (JMX). [http://java.sun.com/j2se/1.5.0/docs/guide/jmx/index.html] (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="266b1b7900f55976-0f0035c6-40fc4e55-8d9fa4db-5e1df41bb4f8559f38429d7f"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro> \[Sun 04b\] Sun Microsystems, Inc. Java Object Serialization Specification, Version 1.5.0. http://java.sun.com/j2se/1.5.0/docs/guide/serialization/spec/serialTOC.html (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac5908e767863b86-7e7d0573-4f74462e-a7eba3de-c9bebd646aae27e90a56e01c"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro> \[Sun 04d\] Sun Microsystems, Inc. JVM Tool Interface. http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/jvmti.html (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ada32320567ba35e-e2de8907-4e154503-a1ecbf36-dc8cf783ad0c03ed8e3ffb59"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 2006\] [Javaâ„¢ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0af831159ebafab-b1eee3ae-4d0b488b-84e3a5a2-331a5cde53a8e505c97ffec1"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro> \[Sun 2008\] [Javaâ„¢ Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b442e557bdeb5a1-798b5619-4347465d-96d3b664-5526cbbc301821c2d0da8f89"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro> \[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a3441ef03e3ff66-666f1029-48cb4d2b-86a98db8-4d1ce8338acad10246a5d708"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro> \[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbc1b744c1fe3914-aae088d1-416e4b56-a5f2a5bb-a81da9e2442daf52e4980856"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d0a5253a248ca0d-e8ecc861-4f7545f9-a65e90d9-3b7f68bd1fd3112cd53326d8"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro> \[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d30efed290c4ec9a-190d959c-40d74f45-8be1ba25-384313022d5ffc7d09e1e07f"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee69b683f265fd96-3d71d1ac-4ef643ea-9bfcb26a-b8bb14f21c15fdef4a6a030d"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro> \[Unicode 2003\] The Unicode Consortium. The Unicode Standard, Version 4.0.0, defined by: The Unicode Standard, Version 4.0 (Boston, MA, Addison-Wesley, 2003. ISBN 0-321-18578-1) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e65088a6c7a7006-8af280f5-4d51421f-9492a2a1-9afbfa59edebb0d1d4da3830"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro> \[Unicode 2007\] The Unicode Consortium. The Unicode Standard, Version 5.1.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007. ISBN 0-321-48091-0), as amended by Unicode 5.1.0 ([http://www.unicode.org/versions/Unicode5.1.0/]). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76903243c692c3a6-59a8e96b-43c34868-a3fd8cf9-63873c830f9ddc47fe53c692"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro> \[Unicode 2011\] The Unicode Consortium. The Unicode Standard, Version 6.0.0, (Mountain View, CA: The Unicode Consortium, 2011. ISBN 978-1-936213-01-6)[http://www.unicode.org/versions/Unicode6.0.0/] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b93db40817344987-6cf0838d-42e84cc7-b9e7bc92-e558205326df22b02bc7e739"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro> \[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17c365f21d51a8f3-8d54fe4c-40514353-b021a252-6174fbd096289f3ac45ab958"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b874aa473385459a-e45b82d9-41094428-bdf79a6d-a809be5b388f28d842950329"><ac:parameter ac:name="">VU439395</ac:parameter></ac:structured-macro> \[VU\#439395\] Lipson, Howard. Vulnerability Note [VU#439395|http://www.kb.cert.org/vuls/id/439395], _Apache web server performs case sensitive filtering on Mac OS X HFS\+ case insensitive filesystem,_ 2001. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2d2204570a1179b-278d27f9-4eac4e86-aaa1860b-101c803148cc54c703359f23"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro> \[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e991c855bc60391e-2fe29191-430b47db-bd8fb04e-9450400f2bf11c908c5a576c"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro> \[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44d3708e0d826e77-c956f057-4d974ad1-8259a8d0-e5ad5050c5560a574a53e6e3"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro> \[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86daa34d7cd8922a-98f096e5-4d8e4901-8082b63c-23ba51edca170d041dfa19e4"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35d1e697a21a9ba3-0cc58e87-47464fc3-8130948d-746c0081b944515486f5560b"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004) |