[Apache 2014] Apache Tika: A Content Analysis Toolkit. The Apache Software Foundation (2014).[API 2006] Java Platform, Standard Edition 6 API Specification, Oracle (2006).[API 2011] Java Platform, Standard Edition 7 API Specification, Oracle (2011).[API 2014] Java Platform, Standard Edition 8 API Specification, Oracle (2014).[Arnold 2006] Ken Arnold, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed., Boston: Addison-Wesley (2006). [ASVS 2019] OWASP Application Security Verification Standard Project (2019).[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "Partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981).| Anchor |
|---|
| Conventions 09 |
|---|
| Conventions 09 |
|---|
|
[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).[Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).[Coverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity (2007).[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls: 50 New Time-Saving Solutions and Workarounds. Indianapolis, IN: Wiley (2003).[Davis 2008] Davis, Mark, and Ken Whistler (Ed.). Unicode Standard Annex #15: Unicode Normalization Forms (2008).[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252.| Anchor |
|---|
| Dougherty 2009 |
|---|
| Dougherty 2009 |
|---|
|
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).[FindBugs 2008] FindBugs Bug Descriptions (2008/2011).[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).[Fortify 2014] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2014).[GNU 2013] GNU Coding Standards, §5.3, "Clean Use of C Constructs." Richard Stallman and other GNU Project volunteers (2013).[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Boston: Addison-Wesley Professional (2006).[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2007).[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Boston: Addison-Wesley (2003).
[Goodliffe 2007] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press (2007).[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1: A Catalog of Reusable Design Patterns Illustrated with UML, 2nd ed. Indianapolis, IN: Wiley (2002).[Grubb 2003] Penny Grubb, and Armstrong A. Takang. Software Maintenance Concepts and Practice, 2nd ed. River Edge, NJ: World Scientific (2003). | Anchor |
|---|
| Guillardoy 12 |
|---|
| Guillardoy 12 |
|---|
|
[Guillardoy 2012] Guillardoy, Esteban. Java 0-day Analysis (CVE-2012-4681) (2012).[Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill (1995).[Havelund 2009] Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version 1.1 (2009) [Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability. MarkMail (2006).| Anchor |
|---|
| Hirondelle 13 |
|---|
| Hirondelle 13 |
|---|
|
[Hirondelle 2013] Hirondelle Systems. Passwords Never Clear in Text (2013).[ISO/IEC 9126-1:2001] Software Engineering—Product Quality—Part 1, Quality Model (ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardization (2001).[ISO/IEC 24765:2010] Systems and Software Engineering—Vocabulary (ISO/IEC 24765:2010). Geneva, Switzerland: International Organization for Standardization (2010).[JLS 2013] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2013).| Anchor |
|---|
| Jovanovic 06 |
|---|
| Jovanovic 06 |
|---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006).[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006).[JVMSpec 1999] The Java Virtual Machine Specification. Sun Microsystems (1999).[JVMSpec 2013] The Java Virtual Machine Specification: Java SE 7 Edition. Oracle America (2013).[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).| Anchor |
|---|
| Kalinovsky 04 |
|---|
| Kalinovsky 04 |
|---|
|
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).| Anchor |
|---|
| Knoernschild 02 |
|---|
| Knoernschild 02 |
|---|
|
[Knoernschild 2002] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2002).[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Boston: Addison-Wesley (2000).[Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).[Long 2012] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Boston: Addison-Wesley (2012).[Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code, 2nd ed. New York: Wiley (1999).[Mettler 2010] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI: 10.1145/1814217.1814224, 2010.[Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992). [NIST 2017] NIST Special Publication 800-63 (2017).[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).[Oracle 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008).[Oracle 2010a] Java SE 6 HotSpot™ Virtual Machine Garbage Collection Tuning. Oracle (2010).[Oracle 2010b] New I/O APIs. Oracle (2010).[Oracle 2011a] Java PKI Programmer's Guide, Oracle, 2011.[Oracle 2011b] Java Platform™, Standard Edition 6 Documentation, Oracle, 2011.[Oracle 2011c] Package javax.servelt.http, Oracle 2011.[Oracle 2011d] Permissions in the Java™ SE 6 Development Kit (JDK), Oracle, 2011.[Oracle 2012a] API for Privileged Blocks. Oracle (1993/2012).[Oracle 2012b] "Reading ASCII Passwords from an InputStream Example," Java Cryptography Architecture (JCA) Reference Guide. Oracle (2012).[Oracle 2012c] Java Platform Standard Edition 7 Documentation. Oracle (2012).[Oracle 2013a] API for Privileged Blocks, Oracle, 1993/2013.[Oracle 2013b] Reading ASCII Passwords from an InputStream Example, Java Cryptography Architecture (JCA) Reference Guide, Oracle, 2013.[Oracle 2013c] Java Platform Standard Edition 7 Documentation, Oracle, 2013.[Oracle 2013d] Oracle Security Alert for CVE-2013-0422, Oracle, 2013.[OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005).[OWASP 2008] OWASP. Open Web Application Security Project homepage (2008).[OWASP 2009] OWASP. Session Fixation in Java (2009).[OWASP 2011] OWASP. Cross-site Scripting (XSS) (2011).[OWASP 2012] OWASP. "Why Add Salt?" Hashing Java (2012).[OWASP 2013] OWASP. OWASP Guide Project (2011).
[Paar 2010] Paar, Christof, and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. New York: Springer (2009). (Companion website contains online cryptography course that covers hash functions.)
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).[Policy 2010] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Oracle (2010).[Reddy 2000] Reddy, Achut. Java Coding Style Guide. (2000).[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).[SCG 2010] Secure Coding Guidelines for the Java Programming Language, version 4.0. Oracle (2010).[Seacord 2009] Seacord, Robert C. The CERT C Secure Coding Standard. Boston: Addison-Wesley (2009).[Seacord 2012] Seacord, Robert, Will Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch. Source Code Analysis Laboratory (SCALe) (CMU/SEI-2012-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012. http://www.sei.cmu.edu/library/abstracts/reports/12tn013.cfm.[Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2013). See http://www.cert.org/books/secure-coding for news and errata.| Anchor |
|---|
| SecuritySpec 08 |
|---|
| SecuritySpec 08 |
|---|
|
| Anchor |
|---|
| SecuritySpec 10 |
|---|
| SecuritySpec 10 |
|---|
|
[SecuritySpec 2010] Java Security Architecture. Oracle (2010).[Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007).[Sethi 2009] Sethi, Amit. Proper Use of Java's SecureRandom. Cigital Justice League Blog (2009).[Steinberg 2008] Steinberg, Daniel H. Using the Varargs Language Feature. Java Developer Connection Tech Tips (2008).[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).[Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006).| Anchor |
|---|
| Sutherland 10 |
|---|
| Sutherland 10 |
|---|
|
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010).[Tools 2011] JDK Tools and Utilities Specification. Oracle (2011).[Tutorials 2013] The Java Tutorials. Oracle (2013).[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).[Unicode 2013] The Unicode Consortium. The Unicode Standard, Version 6.2.0, defined by Unicode 6.2.0. Mountain View, CA: The Unicode Consortium (2013).[Vermeulen 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).[Viega 2005] Viega, John. CLASP Reference Guide, Volume 1.1. Secure Software (2005).[W3C 2003] The World Wide Web Security FAQ. World Wide Web Consortium (W3C) (2003).[Ware 2008] Ware, Michael S. Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008).[White 2003] White, Tom. Memoization in Java Using Dynamic Proxy Classes. O'Reilly onJava.com (2003).[Zadegan 2009] Zadegan, Bryant. A Lesson on Infinite Loops (2009).| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17502a8f-6f0c-46df-b8b2-7b0e20dcef49"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
\[Abadi 1996\] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. _IEEE Transactions on Software Engineering_ 22(1):6–15 (1996). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0aafab79-1c5f-4cfd-988f-3299c0c341f8"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89ecb40f-bb03-4c34-be1a-a5daa7b3cdc1"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
\[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle (2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0ba6bd7-f5c0-4dca-a006-9df3fe253062"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6acfefbc-f451-41dd-929e-a8895dd0e752"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
\[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/partialorder.html] (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8277be51-b5b0-4694-ae47-05dd57c739f2"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
\[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/totalorder.html] (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f67fd0d-5f61-45a5-9e8e-bebe486e3670"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb0e0395-b723-4761-b65b-1b1612c60a23"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f77c53e-bdb9-4a5e-8214-e04a743397f6"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
\[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b88bbdb7-5964-4c31-8dad-b7048641bc93"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
\[Bloch 2007\] Bloch, Joshua. [Effective Javaâ„¢ Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77ce2272-92c7-4058-ad6a-0b538fb71447"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff824a37-8481-4165-9354-f89fb9f279b2"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
\[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac41ea90-0492-4251-bcb1-3768da7a4ad9"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
\[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Javaâ„¢ Technology-Based Memory Model. JavaOne Conference (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65cd4bdb-f026-40f8-be3a-8efd142394e0"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aed017b3-03e2-49fa-9f2a-9185f55347a0"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
\[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed413413-68dc-4f32-b4dc-cf46d787735b"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d86cbd2-02da-4505-9555-d053a18ec6c7"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
\[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c7ad99c-52f9-4b62-86ad-f9baaeefa40d"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
\[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5783da5-063f-4d77-86e4-20ca6818e0a3"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
\[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48–54 (1981). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab238096-7aed-41a6-a172-f2536df7afea"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
\[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8b6cabb-954a-4d62-a310-196eea6bbc2c"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
\[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdd364a8-aa64-4520-aff1-01d4d8f356e7"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
\[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Javaâ„¢ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="543a4f28-d80d-41eb-95dc-023219824bc3"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
\[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d32504bb-da4a-4c27-9aba-ade9ffc02d44"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
\[CVE 2008\] MITRE Corporation. \[Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b07a1fb-c5af-4249-9242-43cb6765c2fb"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="131d008a-b727-441d-90ab-f795c1b3802c"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e463a69d-fce8-4a67-a8ce-b8276c6e8e25"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: O’Reilly (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bcf73e3-4452-42a5-b1e7-a095bccdc72e"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
\[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05ba26cd-7e4d-4e5a-8d10-b789e750ce89"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
\[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3ea22e1-caba-4b6a-8aab-441c745d9416"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
\[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143–155 (1966). doi: 10.1145/365230.365252. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8189072-284a-4ec2-98c9-83880634adba"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
\[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. https://buildsecurityin.us-cert.gov (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24ffa868-ab75-4f46-831b-616648ec3afe"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
\[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html] CERT Vulnerability Analysis Blog (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0108f7f2-edf7-4cc5-a4c1-2aeb2392e072"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_ (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae8b23e1-5279-462d-97b9-be87a187d02b"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
\[Dougherty 2009\] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010 (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07361fa1-6e4f-47a4-932e-0da7063a0821"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
\[Eclipse 2008\] [The Eclipse Platform|http://www.eclipse.org/platform/], The Eclipse Foundation (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c252083-ecd9-4119-8f0e-d22f51308e7f"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
\[Encodings 2006\] [Supported Encodings|http://docs.oracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Oracle (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54ddd1ba-0aa7-4f09-97e0-bf6717ff0e72"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 2003\] Eckstein, Robert. _Java Enterprise Best Practices_. Sebastopol, CA: O'Reilly (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27ab59ef-4eed-49de-8453-a33c6c81b16a"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
\[ESA 2005\] ESA (European Space Agency). [Java Coding Standards|http://software.ucv.ro/~eganea/SoftE/JavaCodingStandards.pdf]. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b812a2d7-44e7-4050-9729-c449e4bb65f5"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
\[Fairbanks 2007\] Fairbanks, George. [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html]. PhD thesis, Carnegie Mellon University (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b7928f2-6917-4111-9dd4-e66b61afbfb0"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1201b9b9-f3a3-4afd-a7da-9ff41d6c5e05"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 2003\] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. _JDBC API Tutorial and Reference_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2d8e786-021f-4ae3-9eb7-ba61a9717b5b"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 2005\] Flanagan, David. _Java in a Nutshell_, 5th ed. Sebastopol, CA: O'Reilly Media (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f98e3293-f677-4713-9aea-ac0f76c5a69b"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] Fortify Software Security Research Group with Gary McGraw. [A Taxonomy of Coding Errors That Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] (see Java/JSP) (2008/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c8d8dff-baa8-45a4-96d0-78ec39752793"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
\[Fox 2001\] Fox, Joshua. [When Is a Singleton Not a Singleton?|http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html]. _JavaWorld_ (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25328e64-5d8c-4cfb-a054-38c1a8647298"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
\[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm]: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73c686a6-9499-4bb3-b8b2-b46d8343c30d"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
\[Gafter 2006\] Gafter, Neal. [Neal Gafter's blog|http://gafter.blogspot.com/] (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15621549-9dd1-4fb4-b12f-74d1bfd1ae6f"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
\[Gamma 1995\] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. _Design Patterns: Elements of Reusable Object-Oriented Software_. Reading, MA: Addison-Wesley (1995). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="263621a9-f043-4822-a54f-d1cd3c7ef9b0"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 2001\] Garms, Jess, and Daniel Somerfield. _Professional Java Security_. Birmingham, UK: Wrox Press (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10db2d16-9abe-4f04-a398-80ad1a7a7a7f"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
\[Goetz 2002\] Goetz, Brian. [Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html]. IBM developerWorks (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d6f8f7f-7877-4e57-995e-0c54b8353cda"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
\[Goetz 2004\] Goetz, Brian. [Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes|http://www.ibm.com/developerworks/java/library/j-jtp01274.html]. IBM developerWorks (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07174753-6ff7-4bfa-917c-315d06340ac9"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
\[Goetz 2004b\] Goetz, Brian. [Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?|http://www.ibm.com/developerworks/library/j-jtp05254.html] IBM developerWorks (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be6fc68e-aaea-454c-9759-3a71b5a09e03"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
\[Goetz 2004c\] Goetz, Brian. [Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent|http://www.ibm.com/developerworks/java/library/j-jtp11234/]. IBM developerWorks (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6aafb1b6-0b6a-423b-8bc3-bbf17eaa34b0"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
\[Goetz 2005\] Goetz, Brian. [Java Theory and Practice: Be a Good (event) Listener, Guidelines for Writing and Supporting Event Listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html]. IBM developerWorks (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c58e511-60fb-4415-9e46-089c19648aef"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
\[Goetz 2005b\] Goetz, Brian. [Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships|http://www.ibm.com/developerworks/java/library/j-jtp11225/]. IBM developerWorks (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fde888bb-e025-477f-b530-bd082090767e"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 2006\] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. _Java Concurrency in Practice_. Upper Saddle River, NJ: Addison-Wesley Professional (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c80e78f2-7493-435d-ace2-e62fbb78f58f"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
\[Goetz 2006b\] Goetz, Brian. [Java Theory and Practice: Good Housekeeping Practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html]. IBM developerWorks (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26cbc1df-2b79-476b-ad64-380a2c8a3eb5"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
\[Goetz 2007\] Goetz, Brian. [Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html]. IBM developerWorks (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4019759b-fb19-4b53-b847-ac36e83d360e"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic| http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html]. ©Sun Microsystems (1991/2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5d7cb7f-eb83-4f1f-b246-c449723386e8"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 2003\] Gong, Li, Gary Ellison, and Mary Dageforde. _Inside Java 2 Platform Security: Architecture, API Design, and Implementation_, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29828618-5b6f-4af7-b51c-4f29e4b1b628"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
\[Grand 2002\] Grand, Mark. _Patterns in Java, Vol. 1_, 2nd ed. New York: Wiley (2002). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da4904db-97e7-4f82-9d97-86be795b8911"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 2000\] Greanier, Todd. [Discover the Secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/]. Sun Developer Network (SDN) (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6e89abd-ee9a-4c5f-ac72-8147e60cd39d"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 2008\] Green, Roedy. [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] (2008/2012). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6abf5ca0-78f5-4707-8019-b96b747cdbd1"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
\[Grigg 2006\] Grigg, Jeffery. [Reflection on Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e8c896e-0993-4629-9af0-cfdb185e7fa6"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
\[Grosso 2001\] Grosso, William. [_Java RMI_|http://oreilly.com/catalog/javarmi/chapter/ch10.html]. Sebastopol, CA: O'Reilly (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="428e1dac-bd4b-4b8a-ae7b-9ed2c56814bc"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 2005\] Gupta, Satish Chandra, and Rajeev Palanki. [Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/]. IBM developerWorks (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="415c68bc-8697-48e3-be8a-efc3ea577256"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
\[Haack 2006\] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. [_Immutable Objects in Java_|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable] (research report). Radboud University Nijmegen (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82da23e7-9992-47bd-96fe-7ed995475863"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
\[Haggar 2000\] Haggar, Peter. _Practical Javaâ„¢ Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af48f230-2cb1-4325-b6f6-fdf767ab0d22"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 2000\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p_p&n=954297433], March 28, 2000. ©Sun Microsystems (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f5a68ba-1ced-4852-aee6-2d50834a54ba"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
\[Halloway 2001\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://www.javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p&n=981107352&p=1&s=t], January 30, 2001. ©Sun Microsystems (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d988bc3a-0a26-497f-ae8d-996f91b010fc"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 1997\] Harold, Elliotte Rusty. _Java Secrets_. Foster City, CA: IDG Books Worldwide (1997). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88f64532-57a0-4e6c-b277-dde700c943de"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 1999\] Harold, Elliotte Rusty. _Java I/O_. Sebastopol, CA: O'Reilly (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58c81fa1-7fce-41bf-b1ad-d7be52b61cde"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
\[Harold 2006\] Harold, Elliotte Rusty. _Java I/O_, 2nd ed. Sebastopol, CA: O'Reilley (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7db944b-dbcb-4a42-9107-a6d0da93530e"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
\[Hawtin 2008\] Hawtin, Thomas. [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf]. Sun Microsystems, Make It Fly. London (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="931bea8d-9241-49df-96b6-0ccde7659a8c"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
\[Henney 2003\] Henney, Kevlin. [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf] (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16d744f8-37b2-45f3-a625-4d8c9ba5c49a"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
\[Hitchens 2002\] Hitchens, Ron. _Javaâ„¢ NIO_. Cambridge, MA: O'Reilly (2002). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6633e51b-2566-45be-bd03-627c78324c69"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
\[Hornig 2007\] Hornig, Charles. [Advanced Javaâ„¢ Globalization|http://61.153.44.88/javaone/2007/java-se/TS-2873.pdf]. JavaOne Conference (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0dea60fd-8675-4059-b8f8-930bfab2f73f"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
\[Hovemeyer 2007\] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In _Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE)_, San Diego (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96db7d3e-29fe-402f-9be9-0cc472d578fb"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
\[Hunt 1998\] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. _IEE Proceedings: Software_ 145(2/3):41–50 (1998). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d24ccfe3-0606-4f0a-a4fc-5561ecbd9fc0"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
\[IEC 60812 2006\] IEE (International Electrotechnical Commission). _Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA)_, 2nd ed. Geneva: IEC (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e28cfe0-d7a2-4908-985a-598b0d519821"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
\[IEEE 754 2006\] IEEE (Institute of Electrical and Electronics Engineers). [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985). New York: IEEE (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eda2f9a4-7d8c-44db-a297-36bddf3f83e4"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, [J2SE Documentation version 1.3|http://docs.oracle.com/javase/1.3/docs/guide/]. Sun Microsystems/Oracle (2000/2010). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7ce8d6f-4ece-4b0e-a235-50d7179a80ee"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
\[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://docs.oracle.com/javase/1.5.0/docs/guide/jar/jar.html]. Oracle (2008/2010). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12fc0ad1-2525-41eb-81bb-07c016f5297c"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
\[Java 2006\] [java: The Java Application Launcher|http://docs.oracle.com/javase/6/docs/technotes/tools/windows/java.html]. Oracle (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60559d0f-d07a-467f-9781-7e04f97d59dd"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
\[Java2NS 1999\] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. _Java 2 Network Security_. Upper Saddle River, NJ: Prentice Hall (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63705c79-0ddc-4a44-b77b-70645f2fc41d"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
\[JavaGenerics 2004\] [Java Generics|http://docs.oracle.com/javase/1.5.0/docs/guide/language/generics.html]. Oracle (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdcb7a89-065f-41f3-a63c-2e0831abda8e"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
\[JavaThreads 1999\] Oaks, Scott, and Henry Wong. _Java Threads_, 2nd ed. Sebastopol, CA: O'Reilly (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eac2411d-8bba-4677-83c8-6c6ff78a282a"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
\[JavaThreads 2004\] Oaks, Scott, and Henry Wong. _Java Threads_, 3rd ed. Sebastopol, CA: O'Reilly (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f43890c-e2b2-4e78-92da-fe4e3097b2bd"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
\[JDK7 2008\] [Javaâ„¢ Platform, Standard Edition 7 Documentation|http://docs.oracle.com/javase/7/docs/]. Oracle (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d94e7b3-cd4c-47a1-acab-ea505f7dcbcf"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 2005\] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. _Java Language Specification_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7cdddce-0a33-4ca5-88f3-da01a126eacf"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
\[JLS 2011\] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. [_Java Language Specification: Java SE 7 Edition_|http://docs.oracle.com/javase/specs/jls/se7/html/index.html]. Oracle America (2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34e3f0d4-2b9a-4b23-9402-2153f0609f4c"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
\[JMX 2006\] [Monitoring and Management for the Java Platform|http://docs.oracle.com/javase/6/docs/technotes/guides/management/index.html]. Oracle (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e06f259-aec5-4f05-8bbc-40226857fb0a"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
\[JMXG 2006\] [Java SE Monitoring and Management Guide|http://docs.oracle.com/javase/6/docs/technotes/guides/management/toc.html]. Oracle (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e954cd3f-1594-499d-a9cc-3219d1c69498"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
\[JNI 2006\] [Java Native Interface|http://docs.oracle.com/javase/6/docs/technotes/guides/jni/index.html]. Oracle (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6400594-c414-4d9a-9be9-1640b0d552a6"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
\[Jovanovic 2006\] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29]. In _Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)_, pp. 258–263, May 21–24, Oakland, CA (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e694eae-ee28-4071-b5ca-026386f7a87d"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
\[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://docs.oracle.com/javase/6/docs/technotes/guides/jpda/index.html]. Oracle (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f4e76fa-6819-4ef7-87d9-bd77fe321638"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
\[JPL 2006\] Arnold, Ken, James Gosling, and David Holmes. _The Javaâ„¢ Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f0b0d87-7e64-44c2-ba6a-2495d87fc083"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
\[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf] (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18ae79f4-e79c-43c0-a8f8-cd2c4bf38ee7"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
\[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://docs.oracle.com/javase/6/docs/technotes/guides/jvmti/index.html]. Oracle (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="463e79ce-2800-44fc-9150-bd2cf2b99d5d"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
\[JVMSpec 1999\] [The Java Virtual Machine Specification|http://docs.oracle.com/javase/specs/]. Oracle (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b4299b5-4005-4856-885f-e9a785133b5e"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
\[Kabanov 2009\] Kabanov, Jevgeni. [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5fdab03-a209-40ce-a811-6145f17f0fea"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 2001\] Kabutz, Heinz M. _The Java Specialists' Newsletter_. (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e4c76ab-0758-4ed7-9a44-6b2e05182b48"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 2004\] Kalinovsky, Alex. _Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering_. Indianapolis: SAMS (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06849c97-5cc8-446e-924d-1631b03e58cd"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
\[Knoernschild 2001\] Knoernschild, Kirk. _Javaâ„¢ Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef562ae4-b851-437a-8204-8560d24c4bae"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
\[Lai 2008\] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. _IEEE Software_ 25(1):13–19 (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c784c85-00a1-4533-bf8f-e64b88375ee5"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
\[Langer 2008\] Langer, Angelica, trainer and consultant. [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html] (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46029082-cffd-4b8e-8374-26ed7c3ad767"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 2000\] Lea, Doug. _Concurrent Programming in Java: Design Principles and Patterns_, 2nd ed. Reading, MA: Addison-Wesley (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c1f2531-c460-4031-a9a0-b57831be6e7d"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
\[Lea 2000b\] Lea, Doug, and William Pugh. [Correct and Efficient Synchronization of Java™ Technology–based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf]. JavaOne Conference (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5444f927-4d16-4fb2-a65f-568aedc05366"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
\[Lea 2008\] Lea, Doug. [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html] (2008/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d10f6aef-0553-4eae-9a06-5be680130912"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
\[Lee 2009\] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf]. JavaOne Conference (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a5b37b2-e6ed-446d-bcfd-57e3e05153a8"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 1997\] Liang, Sheng. _The Javaâ„¢ Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0129c9cd-14c5-4aa1-b905-188f24843348"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
\[Liang 1998\] Liang, Sheng, and Gilad Bracha. [Dynamic Class Loading in the Javaâ„¢ Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945]. In _Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications_, New York (1998). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29c3c3e2-3997-4f71-ac54-9e1455614de1"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
\[Lieberman 1986\] Lieberman, Henry. [Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems|http://portal.acm.org/citation.cfm?id=28718]. In _Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications_, pp. 214–223, Portland, OR (1986). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="872e739b-9be9-4e96-a797-c81ab6bcf150"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
\[Lo 2005\] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. [Security Issues in Garbage Collection|http://www.eng.auburn.edu/users/hamilton/security/papers/STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%A02005.pdf]. _STSC Crosstalk_, (2005, October). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e832249-4830-40a6-a145-8e3d5c4215ee"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 2005\] Long, Fred. [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html]. CMU/SEI-2005-TN-044 (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f10b48a0-75f8-4c42-a50c-f29dc5a5afc9"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
\[Long 2011\] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. _The CERT Oracle Secure Coding Standard for Java_, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51a8296e-b6bf-4e0f-b0b0-e5a258a3de32"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 1997\] Low, Douglas. Protecting Java Code via Obfuscation. _Crossroads_ 4(3):21–23 (1997). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="687e4698-4425-4620-a069-6f3ca5f8de27"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 1998\] Macgregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. _Java Network Security_. Upper Saddle River, NJ: Prentice Hall PTR (1998). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbf8e6c5-50e2-4e7b-9f29-013b90bbace6"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
\[Mahmoud 2002\] Mahmoud, H. Qusay. [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/]. Oracle (2002). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="560c73ff-731a-444d-bcdb-ecae541e2e2b"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
\[Mak 2002\] Mak, Ronald. _Java Number Cruncher: The Java Programmer's Guide to Numerical Computing_. Upper Saddle River, NJ: Prentice Hall (2002). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="071f68e5-a5fa-4098-ae4d-e62d6f674335"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
\[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ae2b601-0885-4d55-877b-4649754e7dd5"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
\[Manson 2006\] [The Javaâ„¢ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f7dc306-0eac-4991-94c3-5f32c1d003d1"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
\[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f8a41aa-3c0a-48d0-972c-173c3e7fc2ae"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
\[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba74f2ca-7b91-46f6-a3b1-7b720f1f156c"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7af65cb8-773e-4f76-b157-aae7a2da9bec"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
\[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward Felten, JavaWorld.com. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3605d0b2-021f-463e-9066-773686241d16"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
\[Miller 2009\] [Javaâ„¢ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a89af55-46a8-4098-8b6b-dbdb2bf3bf94"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
\[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f867e3b-d9b7-4208-9d8d-a886c4db87b7"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87876877-bd3c-4e71-9ef7-994f4d582675"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
\[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e870b26a-87b2-401e-a0ad-1ca0e971113a"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
\[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83f075b5-6808-466b-85f5-7c5c5148b8de"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
\[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9eec6af-ad7d-48df-b594-fdc28def65a8"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro>
\[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="886794c6-6709-4ea9-b0fc-15cb0b77b451"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77bdbd9b-45c4-4a15-a21a-0f6ae39f5cec"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
\[Naftalin 2006b\] [Javaâ„¢ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ea1a082-b97e-4af6-9f1e-ec5f550537f8"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
\[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2e3aa49-89ae-4952-bbfb-5411aab713af"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
\[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1609d41-5381-44f9-8b16-8160b2447c12"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
\[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71896964-b95d-4dc8-8703-361e2028fc38"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
\[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f97d1297-5db3-4b7b-b085-8032e6ee5749"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15801ea6-10be-4a12-8e19-0f467b715460"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
\[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d134ef0c-0cff-4810-ad7d-4b17fcab6e3a"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
\[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39c811fa-9aa7-4738-99af-c2fa966fcc54"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
\[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62a575e8-b598-4745-ba30-eba2b8fd3361"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="720fdaf3-c2e0-4040-af57-16ce89b8fe98"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
\[Permissions 2008\] [Permissions in the Javaâ„¢ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66041557-b2d4-4c31-ae11-67034b6ec83e"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
\[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="debb81f6-40ed-473f-b3ef-796330319e53"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
\[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99ef1134-4400-41b2-bb9b-3d22a0e31719"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69378246-fc1a-4d9d-99b2-616116c99ce7"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
\[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73f45108-e050-467d-8b75-3bd459fd28b0"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
\[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db5d0f06-5e35-485f-a8cb-727226dc51b9"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
\[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66d76f54-4a5c-40e5-8960-eebbab852109"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
\[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e4dcbfb-5421-4a6e-b166-cdd2fadb0ee0"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
\[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="208e76b7-6f9c-45e6-b567-31e03ce6fbd7"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
\[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8ccc328-b545-443a-b309-a7fad9906a75"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
\[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7d01098-4216-480f-b577-d2ba0a7bd104"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
\[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eee4ef2a-6b3e-44ff-bbe0-e669bd20c252"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
\[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e5ba4b1-7eea-4069-9c6a-2136facbaaba"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
\[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0f071c4-2f44-49ac-8770-fad414ca5cff"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
\[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41011a1c-91f4-48bc-9ff7-a4308d7e95ae"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
\[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa76902b-5889-41bf-b0eb-d217b777bda2"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75a736f9-c194-41d7-853d-7daf0376d24b"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
\[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7aa2c70-a85e-4f2b-9dee-3e805f98813b"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
\[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b56a9870-300c-4e2b-ba07-2296f985471f"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
\[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee54a8cb-4f5f-4b72-9ded-0a2c6f726d34"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
\[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc0f9f37-23c2-4dd4-935a-bb85ec10ef79"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
\[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="495252e2-c9a3-4efa-8978-efc95a0fc5ab"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
\[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a272175-9a6a-4651-b205-ce21261e0896"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
\[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb17e727-dbf4-402b-9e17-af7b25587dbd"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005)
See [http://www.cert.org/books/secure-coding] for news and errata. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88ad96c1-3180-4c45-bb60-4f3cf89640ca"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a1c5fcc-4422-4b0c-b9a6-5234790cd400"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f048f40-4666-4118-b8ef-f26bd6adcaee"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
\[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c61e841-ddc0-4b0e-8fd1-aacd34ef25a4"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
\[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f48385b6-912d-47b0-bebc-dc56b90ac7f5"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56df9c18-6b72-44c5-a168-763db08aceb4"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
\[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd184164-2585-4fa3-8f99-7790f044185b"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
\[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a2514bd-9d72-4e1b-9e83-12db0e342345"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
\[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8c02eed-a128-4822-b73a-8a3a4598074c"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
\[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9076ff92-a2be-4b7a-ba35-b877971d371e"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
\[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f719bff-77e5-4ae3-ae47-0cb221b7ae5e"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
\[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2a586f5-d8c7-44c7-a770-76792d9b277b"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
\[Sun 2006\] [Javaâ„¢ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="772fa5a2-f12a-4cba-a880-e0483c1eac8a"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
\[Sun 2008\] [Javaâ„¢ Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc07c4f2-2881-4a9c-979a-da6d572647f9"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
\[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21a1c1ea-7191-4265-9b6a-04eada584f55"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
\[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2c4a9c4-632c-458d-9406-7833acd3b6be"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
\[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b33ab97e-11dc-41cc-ae77-a6be7cea6bb3"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
\[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="693be20a-5390-4fe7-8d33-02c308248c21"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
\[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html], Oracle Inc. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a50fb69-7b08-4f16-8d60-4ca46619d33a"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="756e7d47-7089-4122-8371-e1e5b17c32b6"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
\[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="656d6c1a-445d-4e9d-bb67-2ac152bb70ba"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
\[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e26fee1-4649-4e7d-a34c-942b1f4e7396"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
\[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e8d4ce4-cd18-4ab5-be2b-df18a0d3e38a"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
\[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6b67eb6-0878-457c-86a4-aa60496a4624"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
\[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="209835b0-43a9-41ed-96c3-5a080b008641"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
\[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41b831f9-34e7-49ca-9353-86f2b22eefb3"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
\[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
| Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a31d327-244a-4eda-b9d5-b330432bf671"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
\[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004)