<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb986e15-0078-46f9-88dc-a5ca7ce3bb8a"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b6a4097-b9b3-402b-a0b8-8eedc25c4560"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64d749dc-3e09-44b7-b7df-ef530f173bf9"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform
, Addison-Wesley Longman, Boston, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fc93634-ca01-4bc4-bd14-c456e277da5a"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57099fde-6488-43ab-8aa0-6f5e784fecef"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dc51255-0adf-4b1e-b240-0e192781d4bc"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdc8e441-08a0-4179-8f78-f211f2afd63e"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1159ea2f-e3b6-49f1-b5fb-b9d939c4dc31"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers
, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cd44861-a90b-43e4-a93f-e408c24f8372"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java⢠Reloaded: This Time It's (Not) for Real
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0aee9c74-6b5b-4d9e-8205-84efd0781634"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="980e6838-6822-4a06-b15a-025b8d89d37f"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f8132ff-8a37-4eb4-a1cb-3262a6f35a53"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java⢠Technology-Based Memory Model, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b79a62db-ee90-49ec-aeb3-1c063878278f"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet
, Addison-Wesley, Reading, MA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a494272-8449-4b44-9c8b-1f7023424a27"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fb8c539-b6bb-48f4-ae25-f24f51420577"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b9596fb-e3f3-411b-a4b0-39b8c17b9381"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa9f8e49-d890-4202-86b3-67faadec9ba2"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a006e3b-e245-43e2-ab16-1b5c3eb0f9bf"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, Volume 14, Issue 10, 1981.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cb4b13e-f300-46f6-8f69-933210b97cd5"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
, Sun Microsystems, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1edaab9-9071-411b-bf70-a827640df9b4"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb4520ee-9326-4547-8db7-ab486fa4ca9c"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming
, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c438b5a-8842-4fa2-b0b0-4ed71e566d1e"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java⢠2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26408624-7610-4d9c-81fd-06cdac216f89"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="992442ec-6e2f-4914-89a9-34931e0b12dc"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't
, JavaWorld.com, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa20aa1c-c5a2-4187-b6bc-32ea5ded6123"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f16cae54-103e-4b0c-b62e-fd8696f7ef4b"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="679137da-508b-41ed-8e4e-12cef946988a"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64cf00c6-d1f5-41e9-8d64-f4bd1dfb0555"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="000e7057-6b6c-411d-8fa5-4be0d158213d"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations
, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22873203-d6f1-4c56-970a-2f6fee6817b0"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In
, U.S. Department of Homeland Security, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e63c320-0e09-420b-8900-a3afd53934a4"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?
, CERT Vulnerability Analysis Blog, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15e6b026-c6b9-4b62-8709-9275463937bc"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling
, ONJava.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a21f31ce-40b2-4f02-9178-0c3568ca999e"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns
, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a37bd85-6dc8-4cd0-80d7-111449dfb010"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57f37085-0fe0-412a-8a16-45ca2de4ac51"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="407ff903-fd41-4974-95ae-5a3bf025b5c3"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture
, Sun Microsystems, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ecfc20a-3efc-4887-a433-6f86b0097b5e"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b542833b-8c87-49b6-a245-b6acb102a700"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9893cb1-c039-49e0-a6e8-5f65a9c71c35"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c783bac-56dc-4162-92c3-d354faf1a0fa"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3ffbc6e-d5b5-4385-9881-3709a29a28a2"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ec65609-d0e2-4e3c-8d65-eec4b0962692"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5358bfe-fc9a-4788-9a18-7bbe08a1f41c"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="812372f0-3c37-48bd-bb6f-c0e15b18c886"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
, Java/JSP, Fortify Software, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51224815-528a-4f10-a0a5-8d047d1239b2"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?
, Sun Developer Network, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ef653be-1fb7-4812-9439-2418e8b3074c"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce1f0ce4-db9f-4364-b32c-3fbb39e0fba0"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="064f8092-3d6a-4e5d-a9cf-cb905e794f71"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd7d420f-a21c-4e8c-9d15-c0be41ac3977"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acf00cbb-2283-4462-ba98-55b90090ff5d"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f245ced7-0a78-4d60-8d10-d9159e23512c"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction
, IBM developerWorks (Java technology), 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec564556-2c83-43ac-b31e-2d05bc76f95c"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ba925a7-f45d-41e0-9471-d8d9eefbad3a"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c91da64-a674-495c-9bc2-e142d7d65f7b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0f636af-a214-496a-9b49-064bae75a18f"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0cba532-d0ba-4836-bf3a-0b33b1ea2b74"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87736595-6522-45b8-aa49-bfee408545d9"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94009305-6bce-4a35-831a-f16ab52a0b2e"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e6d7199-0c4e-41c8-b2de-b1c38e223ecf"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61882fc8-f625-4734-befb-c8dc848ea922"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic
, Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1af989f9-788d-45bf-860c-1d72b983e3d7"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c79d337-2809-4786-a37b-fd4753c8314e"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb4693ef-4cdf-43eb-b9c2-24582674fc78"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API
, Sun Developer Network (SDN), 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31b1d701-8251-4694-ab69-2a8b1d82f5e2"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="970fd48c-5f6b-4538-8751-118c464ca890"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d4f3837-eb4f-406a-8a65-c4c653f0e0e4"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI
, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccc1a11b-41e2-4a21-9ab7-ceb3604e2f5d"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a3f77b9-d54c-4566-bf9c-85e8541c69b2"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22096e1a-063c-4782-b502-d20b25f096fd"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java⢠Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="958d1a73-0683-423d-aa10-062465631fb9"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips
, March 28, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42ace5b3-f41c-4785-83a1-64b972396868"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips
, January 30, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cfc5734-0afa-482f-b8d5-33de8e886b7e"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5653faca-efe4-4350-842e-340fae3ec68c"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4453fbf5-78d6-4d0a-91a8-ee5edddb20cd"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62173db6-8a2c-4041-95fa-0f5f68a83589"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
, Sun Microsystems, Make it Fly 2008, London. 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8daf57a-b6c3-407b-8af2-41d7f1a0b289"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28eeabb5-b832-4588-bf93-04a7203f365a"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e32778d7-930f-4869-8fc5-dab34f325155"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java⢠NIO_, O'Reilly, Sebastopol, CA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7019723a-8bcf-4473-bbe1-c9a5951b80ce"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java⢠Globalization
,JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="737e9575-b29a-454a-a070-7ea625f19259"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ace29f25-6688-4176-90c8-f8544e8ec13c"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code
, 2nd ed., Microsoft Press, Redmond, WA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40b049db-745f-4fff-bc04-eba7fd334110"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50b4410b-2af6-4f85-870f-462135970eac"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="146ed5e1-1c89-49a8-9dcc-ba73d7abd66e"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="950a85ea-0c05-4c07-ae9d-239897659912"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfe59b36-4184-4184-a528-203a4d55e52d"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba85bd8d-14c2-4da7-b830-a39975703560"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corporation, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4304ac52-5ca3-4a43-9d01-1975f97b5337"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="656bc147-161e-4f77-9932-5dd9f5c869c6"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5422b419-a4ab-4838-b5d4-bf7f3e5a17c0"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aeb914e1-6129-4376-bc2b-d3486f3b57d1"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="91cd5813-0135-401c-8199-b094eb7278fa"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ce2c184-f1a1-4bc5-a0dc-ddb4a9b6d062"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9122c325-82a9-49f9-a5a2-d7bc3fb72449"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, December 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7079553-a9b8-48b6-a16a-c9a833eaccc8"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification
, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="878f6379-f600-4e27-8e71-ebc84ecafe17"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b871e74-f364-4e79-9691-f3e0c3383061"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c2dabfd-1a6a-4a41-875a-0b9614f08be4"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef8198ac-59c1-42d6-a34a-209836a4d415"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.258-263, May 21-24, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b914ab94-521a-4ba6-9494-dc8962c7e07b"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9942a72-bc6a-4177-835f-7908b96f55e2"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Ken Arnold, James Gosling, and David Holmes, _The Java⢠Programming Language_, 4th ed., Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1067c7aa-e2f2-485b-812c-49bb161eccbc"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="019151ea-ec1d-411d-bf87-532319df8670"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b190469d-4744-43ee-823f-b17d8be234f3"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cabedf4-5c74-4d5a-8393-0fea0db5f3d9"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Jevgeni Kabanov, The Ultimate Java Puzzler
, February 16th, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5da5f11-853a-4b32-b782-94bf96d00f85"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Heinz M. Kabutz, The Java Specialists' Newsletter, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e46449d4-d2f1-43a3-865a-5543e5537f1d"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Alex Kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9a24ad0-c855-432e-88ef-6b7500a08be8"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Kirk Knoernschild, _Java⢠Design: Objects, UML, and Process_, Addison-Wesley Professional, Boston, MA, 2001.
[Lai 2008] Charlie Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="911a8fd1-2bc0-4ad0-aa00-ef1885c36fca"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Angelica Langer, Practicalities – Programming with Java Generics
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2df09af-8497-4fab-8f36-ac65578ec8a2"><ac:parameter ac:name="">Laplante 05</ac:parameter></ac:structured-macro>
[Laplante 2005] Phillip A. Laplante, Colin J. Neill, Antipatterns: Identification, Refactoring, and Management
, Auerbach Publications, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e902460-b23b-4ddd-8fb5-c4013860a7f2"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000a] Doug Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13e20702-dd7a-404f-b97f-7b64b54fa9db"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Doug Lea and William Pugh, Correct and Efficient Synchronization of Java⢠Technology based Threads
, JavaOne Conference, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d29a28d0-c6e3-40cd-b7ce-ace06451cc2d"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Doug Lea, The JSR-133 Cookbook for Compiler Writers
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0812084-0bf8-43b6-876a-d99463d76088"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Sangjin Lee, Mahesh Somani, and Debashis Saha, Robust and Scalable Concurrent Programming: Lessons from the Trenches
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42103dda-11d3-4455-8372-2fa391fdd3d7"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Sheng Liang, _The Java⢠Native Interface, Programmer's Guide and Specification_, Addison-Wesley Professional, Reading, MA, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf9a6037-48db-4aa7-9207-07e6483727d5"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Sheng Liang and Gilad Bracha, Dynamic Class Loading in the Java⢠Virtual Machine
, Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b82b4d0d-248f-43f2-af03-b36d14fe6f18"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Henry Lieberman, Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
, Proceedings on Object-Oriented Programming, Systems, Languages, and Applications, pp. 214-223 (ISSN 0362-1340), Massachusetts Institute of Technology, 1986.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a289a5ca-3226-4f3f-8921-433377fdf162"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Chia-Tien Dan Lo, Witawas Srisa-an, and J. Morris Chang, Security Issues in Garbage Collection
, STSC Crosstalk, October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bab0372a-d7a6-41e7-a6a0-d7baa978afa1"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Fred Long, Software Vulnerabilities in Java
, CMU/SEI-2005-TN-044, Software Engineering Institute, Carnegie Mellon University, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef21f284-4dda-43d3-9a33-e8b7da04cada"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group, Java and Java Virtual Machine Security
. Poland: Last Stage of Delirium Research Group, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ef6d0ba-e70e-4c06-b720-deb26d9a5d1c"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Douglas Low, Protecting Java Code via Obfuscation
, Crossroads Volume 4, Issue 3, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bafe973-4a4f-4275-b5aa-7f30c3e121f5"><ac:parameter ac:name="">MacGregor 98</ac:parameter></ac:structured-macro>
[MacGregor 1998] Robert MacGregor, Dave Durbin, John Owlett, and Andrew Yeomans, Java Network Security, Prentice Hall PTR, Upper Saddle River, NJ, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="044a5f8c-5513-44da-80e3-73a67ffb0963"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Qusay H. Mahmoud, Compressing and Decompressing Data Using Java APIs
, Oracle, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62b9f430-4bb3-4f49-be17-9fddf00cc8c3"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Ronald Mak, Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bba44f4d-7c6e-4046-8a39-460862fed7a8"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Jeremy Manson and Brian Goetz, JSR 133 (Java Memory Model) FAQ
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d04f086e-b486-42cf-95d9-9c72dbbeb826"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Jeremy Manson and William Pugh, The Java⢠Memory Model: the building block of concurrency
, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb53d401-eb4f-40df-b82d-a8e57e8cd9a7"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Robert C. Martin, Granularity
, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3cc751b-7250-4d7f-8070-a9f9e24e1157"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Glen McCluskey, Java Developer Connection Tech Tips, April 10, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df46b576-5c48-4998-9b29-47f461e9db10"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Gary McGraw and Edward W. Felten, Securing Java, Getting Down to Business with Mobile Code, Wiley, New York, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95ae49c2-72a0-40fb-8930-71179855063d"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Gary McGraw and Edward W. Felten, Twelve rules for developing more secure Java code
, JavaWorld.com, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3f542ee-3603-4dc5-ab18-eeac3acca2a8"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfc86129-2c4d-4573-8dcc-7e06f5111c25"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java
, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI=10.1145/1814217.1814224, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9521cbd-5a99-44df-9e4c-5a99a4a2e3f9"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Alex Miller, Java⢠Platform Concurrency Gotchas
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d3ca19c-66da-407b-8f88-3c160c54851b"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] MITRE Corporation, Common Weakness Enumeration
, 2011. Available at http://cwe.mitre.org/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="344ba0c4-cb53-4683-bd0f-108a90102a0a"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daacea26-c7e0-48d9-9396-b07dc1e8ccce"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Jan P. Monsch, Ruining Security with java.util.Random
Version 1.0, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23149070-953d-46c1-ad5f-b5a589793e78"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft Corporation, Using SQL Escape Sequences
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7644cf99-df3d-4b02-9e27-fd41a8be32d2"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] John W. Muchow, MIDlet Packaging with J2ME
,ONJava.com, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46a3b12a-c2d1-4ddf-91a9-948dd18df647"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Dr. Andreas Müller and Geoffrey Simmons, Exception Handling: Common Problems and Best Practice with Java 1.4
, Sun Microsystems GmbH, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8b2b9a7-3e57-4ba6-ab85-db5a7dbdafe2"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006a] Maurice Naftalin and Philip Wadler, Java Generics and Collections, O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b37fbe85-b205-43ba-a283-4203182acf28"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Maurice Naftalin and Philip Wadler, Java⢠Generics and Collections: Tools for Productivity
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71c62eda-0688-48e5-b2c2-9438630c8ecd"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Robert H. B. Netzer and Barton P. Miller, What Are Race Conditions? Some Issues and Formalization
, University of Wisconsin, Madison, 1992.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a60952f-4679-4b71-b76b-51cbd1d00829"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Ted Neward, Effective Enterprise Java, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dea9868-2724-43c0-b5c8-c785adcb7612"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Jeff Nisewanger, Avoiding Antipatterns
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f81c7c1d-1d62-4437-a4bc-e85b097a8252"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Godfrey Nolan, Decompiling Java, Apress, Berkley, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d39aac34-45eb-46dd-913b-753396e9af65"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Scott Oaks, Java Security, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03ea8c3d-68c6-49f6-b939-c921d21f0af7"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The IEEE and The Open Group, The Open Group Base Specifications Issue 6
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee918689-a7f9-4d6b-ba12-5b15454a7b48"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Oracle Corporation, Java SE 6 HotSpot⢠Virtual Machine Garbage Collection Tuning
, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e8a94e5-e238-4ae3-922d-51069782c55a"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] The Open Web Application Security Project, A Guide to Building Secure Web Applications and Web Services
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfbe6a52-2cc6-4cf8-98b8-47b610121633"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] The Open Web Application Security Project, OWASP Top 10 for Java EE
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92139370-e397-4006-b110-8b5a81e5e4dc"><ac:parameter ac:name="">OWASP 11</ac:parameter></ac:structured-macro>
[OWASP 2011] Open Web Application Security Project (OWASP)
, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfd3e21f-f80f-49c8-aef2-ba2a5c876691"><ac:parameter ac:name="">PCI 10</ac:parameter></ac:structured-macro>
[PCI 2010] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard
, Version 2.0, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2db858c9-287d-42d7-a519-88f801678864"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ea9e3fc-cc1e-41b1-a937-a2f0c87edd1b"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Paul Philion, Beware the dangers of generic Exceptions
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68a1782b-a153-4f99-81ab-db9ea8aa27b5"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Addison P. Phillips, Are We Counting Bytes Yet?
, 27th Internationalization and Unicode Conference, webMethods, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7c8eeff-06a4-40da-aa7b-d8729c906115"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d2faca9-a004-45b9-9c1c-a1a450b55af8"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Sun Microsystems, Default Policy Implementation and Policy File Syntax
, Document revision 1.6, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78fe5f0b-cbb8-444c-a1cd-1dca0e4046a7"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] William Pugh, The Java Memory Model (discussions reference)
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c7c6d67-64b6-4292-8822-0153489c14b3"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] William Pugh, Defective Java Code: Turning WTF Code into a Learning Experience
, JavaOne Conference, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b26b503f-b64e-4ddd-9046-b3076c935686"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] William Pugh, Defective Java Code: Mistakes That Matter
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c754cdd3-f82d-4096-bbd2-da163cd8cfa0"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, November 14, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17bc49fd-af07-46eb-baf7-de932b2a04bb"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Sun Microsystems, Reflection
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff23c97a-60e4-4e8a-81de-d9ceeb5f3988"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson, The Elements of Java Style
, Cambridge University Press, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f09e647e-6f92-44c2-bb3c-cedcb597ec71"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Arnon Rotem-Gal-Oz, Fallacies of Distributed Computing Explained
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc3b3f67-99ba-4543-b557-4ba5e11cc072"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003a] Vladimir Roubtsov, Breaking Java Exception-Handling Rules is Easy
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="936ba575-3ba1-43b7-bcde-91fd05006096"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Vladimir Roubtsov, Into the Mist of Serialization Myths
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd35fbc7-5fe1-4034-9e82-72dcaea02623"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2b4bfd9-4ba5-42d8-a7be-86165db01a18"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, Volume 63, Issue 9, 1975, 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0f9e5a7-5f8f-4ae2-96bd-3a4ee0f399d2"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Sun Microsystems, Secure Coding Guidelines for the Java Programming Language, version 3.0
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85bf24ad-4554-4648-ac50-7e2f26ebed31"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt, Herb Schildt's Java Programming Cookbook, McGraw-Hill, New York, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39a69b8d-f542-4f3a-9b29-20cfad93d002"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Bruce Schneier, Secrets and Lies---Digital Security in a Networked World, Wiley, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e849b193-e39b-4dbd-92a5-caa21114fb0e"><ac:parameter ac:name="">Schönefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Marc Schönefeld, Security Aspects in Java Bytecode Engineering
, Blackhat Briefings 2002, Las Vegas, August 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8435abd9-f8f3-48ce-838a-351c6ee4c54e"><ac:parameter ac:name="">Schönefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Marc Schönefeld, Java Vulnerabilities in Opera 7.54, BUGTRAQ Mailing List (bugtraq@securityfocus.com), November 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="110fbd75-a209-496c-b6bf-d905ada6b883"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Don Schwarz, Avoiding Checked Exceptions
, ONJava 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a83d8ba4-13ee-4ccb-935c-edf2a97cad72"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Dave Schweisguth, Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide
, Javaworld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e9f080f-de4c-4020-b44a-6de5f4fdddee"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Microsystems,SUN Developer Network
, 1994-2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29dab815-c170-489d-acf4-50e9f88d5b9f"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++
, Addison-Wesley Professional, Boston, MA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69dd88f6-00b2-4041-b785-dbf232c15cd8"><ac:parameter ac:name="">Seacord 08</ac:parameter></ac:structured-macro>
[Seacord 2008] Robert C. Seacord, The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston, MA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="179e40f6-5bbd-4887-b344-d1261a038e23"><ac:parameter ac:name="">Seacord 10</ac:parameter></ac:structured-macro>
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3af69116-6b79-4d7d-9990-77e8690168a1"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Sun Microsystems, Java 2 Platform Security Architecture
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50a0ef54-c3d2-49ea-af5b-1572f7db1354"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia ApS, Secunia Advisories
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="117b0046-e847-4513-84ea-1016dfd3447e"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b2ce447-2127-42ca-9ada-ee51506e109f"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Sun Microsystems, Java Security Architecture
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97859f62-a4ea-4c72-b676-f541ebbd6556"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Robi Sen, Avoid the Dangers of XPath Injection
, IBM developerWorks, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45608708-242f-45ff-8e12-b1435f4434bf"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Christopher Steel, Ramesh Nagappan, and Ray Lai, _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_, Prentice Hall PTR, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47c63015-e75a-4b8b-bdfe-419f3b5ae7c7"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] G.L. Steele, Arithmetic Shifting Considered Harmful
, ACM SIGPLAN Notices, Volume 12, Issue 11 (1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4ac4284-751c-401c-801a-f2513fd140c3"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Daniel H. Steinberg, Java Developer Connection Tech Tips Using the Varargs Language Feature
, January 4, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73fee54c-0f64-4294-a954-93c700f17608"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Andreas Sterbenz and Charlie Lai, Secure Coding Antipatterns: Avoiding Vulnerabilities
, Sun Microsystems, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bc2bacf-16b5-4092-9996-9a7aade42420"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Gregory Steuck, XXE (Xml eXternal Entity) Attack
, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7690a15d-0bb3-4bc8-af09-b8ca375975aa"><ac:parameter ac:name="">Sun 99</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f273850c-9f84-4841-aa79-bdd960d89aff"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 2002] Reflection
, Sun Microsystems, 2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7220cae-dedf-4709-8ed4-182ffa37a2cd"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun Microsystems, Sun ONE Application Server 7 Performance Tuning Guide
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cf5bbc6-cd0e-452e-a8da-019b0519320a"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 2004a] Java Management Extensions (JMX),
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98e3fc3c-3516-412a-95af-9c997d161a94"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 2004b] Java Object Serialization Specification
, Version 1.5.0, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e15f49ac-af8d-4fb0-99f8-be05d648132e"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 2004d] JVM Tool Interface
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8db71abc-06fe-4311-980f-1960fdc3527e"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3482c368-823a-4443-b4b6-013562dd699c"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="778d9f73-03d0-4012-abc8-c6e7c9eed853"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Dean F. Sutherland and William L. Scherlis, Composable Thread Coloring
, Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Association for Computing Machinery, New York, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c65f4d0-4cb1-4182-9339-06681fd48367"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum and Maarten Van Steen, Distributed Systems: Principles and Paradigms
, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e32ec617-54b0-4b94-bd47-f480949df433"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Josh Bloch and William Pugh, The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="416c66fa-24f0-4e02-bfd1-0ae048ac18d3"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Apache Software Foundation,Changelog
and Security fixes
, Tomcat documentation, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e95af10c-73e3-4648-8255-2dc7abfe6d6d"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f92a72a-0284-4b6b-ac22-79be7ff1fe60"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium, The Unicode Standard, Version 4.0.0, defined by The Unicode Standard, Version 4.0, Addison-Wesley, Reading, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="426e896f-4ab5-4a08-b86e-99c9445e5af7"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007] The Unicode Consortium, The Unicode Standard, Version 5.1.0, defined by The Unicode Standard, Version 5.0, Addison-Wesley, Reading, MA, 2007, as amended by Unicode 5.1.0
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="904c6d6d-9d5e-49fd-a42b-91ff3ebc8af4"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium, The Unicode Standard, Version 6.0.0
, The Unicode Consortium, Mountain View, CA, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83246095-76b2-4433-b078-fb7c46e48da7"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Bill Venners, Security and the Class Loader Architecture
, Java World.com, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="add0800d-ff57-4161-bc04-8723cec98149"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Bill Venners, Failure and Exceptions, A Conversation with James Gosling, Part II
, Artima.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b16021e-eb0b-4c58-a686-880a48c4dbb5"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau, Extensible Markup Language (XML) 1.0
, 5th ed., W3C Recommendation, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8860fa5-0124-4a98-a42a-9b18b6ac5c9b"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Michael S. Ware, Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Masters thesis, James Madison University, Harrisonburg, VA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c3b4617-523c-402e-8df2-b82f55d951c2"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Chris Weber, Exploiting Unicode-enabled Software
, CanSecWest, March 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="643011f6-a60c-4022-bd1d-d9f3a2a5a3e9"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] David A. Wheeler, Secure Programming for Linux and Unix HOWTO
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff0b4111-e696-4038-ac80-8d1ae3d5a8d9"><ac:parameter ac:name="">White03</ac:parameter></ac:structured-macro>
[White 2003] Tom White, Memoization in Java Using Dynamic Proxy Classes
, August 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2732e8c0-ef39-445f-b732-aa9e3cb7d526"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] John Zukowski, Creating Custom Security Permissions
, Java Developer Connection Tech Tips, May 18, 2004.