<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fd6f2a7-25b7-4cc8-b5e3-f9a8e98cade6"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="570df4d9-71a5-4410-b07b-ce2f1287fafc"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59e7450a-3b7f-4fe6-a923-0507e2c0fa80"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform
, Addison-Wesley Longman, Boston, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6007121-d646-42bc-9ad2-15da84c9fbe9"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38db7969-2afc-4d16-8996-51a4ccf5174e"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57faef3c-6476-4d3a-913d-fb30502d7d3b"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cce89565-a2f9-42fb-9f75-cb20c607b5d8"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ede470bb-b824-4b5a-a610-cbe0b0c0beb9"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers
, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7d1e79a-79f1-4155-b90c-0363e9df9ccc"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java⢠Reloaded: This Time It's (Not) for Real
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06b2b641-8b64-4755-8ee2-6cf0025e65a5"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b893960e-783d-4d18-8bc5-a216da7bc7f1"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b5a7267-b55e-4a35-b003-3cd66971b06e"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java⢠Technology-Based Memory Model, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10835dbe-a98e-4346-b945-b102d445e18d"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet
, Addison-Wesley, Reading, MA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f79368c2-2c19-45ce-98e4-2c5ad422b2ff"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cddeef18-f729-46d4-87ca-76aecbe76b52"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04cbc6c1-ebb6-4ed8-815b-7408f4c7fa13"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="268e7efc-c479-4c98-8507-1fe922aff96f"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fcaea6d-2199-4fdd-8796-3b0596584e75"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, Volume 14, Issue 10, 1981.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfc8a830-7c75-4e8a-92da-17b0cecb0640"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
, Sun Microsystems, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abcfcb6b-e911-4597-a017-37c7dd3ef527"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ae1a86c-b53d-4e63-9812-d15433f67546"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming
, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61926763-de7d-4f1d-8770-1e87290ddb31"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java⢠2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fc5aada-d46b-467a-9882-19b8fc4ee12f"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be9c46d3-4a50-4673-b44b-deea3a74c8ab"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't
, JavaWorld.com, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc976ee3-1761-4dd5-b3cc-96e474d3262d"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="402cc27d-b5d6-48d8-91ac-277c960d1005"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f6f02ae-6263-4b74-b32d-bad5fda1023b"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c279cf7-63c0-4dc0-adbf-670c59a2ff61"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05c46698-1feb-4dc1-a0fc-c77ad8d7f987"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations
, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9988e30-e1d8-4f85-853e-0ba1788d6ccc"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In
, U.S. Department of Homeland Security, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dbd73ac-6f93-4fce-9e28-798ff038547a"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?
, CERT Vulnerability Analysis Blog, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d51a250-e791-4597-9962-fb8940ca7f23"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling
, ONJava.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99166c4f-60c4-4358-8d4b-47153f5e150c"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns
, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6d9b067-fa46-4fb4-954d-9a6f10ab315e"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84f17cfb-53f4-4528-bc15-fd42f6fdae33"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51b00fff-05a1-4a83-b415-d9df60675f07"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture
, Sun Microsystems, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f8ca7ce-fa18-401d-8587-183e90d4c74a"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c54a67a-d1f9-4f28-bfd2-3a673d43ab93"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e8915f3-c2fc-44b6-a26e-895fe3afa7d6"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdd7870b-e857-4ffb-9548-d57f9010384f"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a404af3c-354a-49ee-b139-e8688d97890d"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="304e5f54-2871-41a3-8352-f6e9a34d8fcc"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bffb61e3-1ef9-493e-81b8-c8ce4d9f9ea6"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81d9acbf-2617-48fe-934f-73610c04d38d"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
, Java/JSP, Fortify Software, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fbc2e52-a210-4e4e-9614-36538aac551d"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?
, Sun Developer Network, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5535f574-de79-44d6-8e48-42e79cc6c38c"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ecbc332-e88b-4f06-86a1-c2781d6ee61b"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f362d4f-4dbc-4287-8a1c-6a4537dfaef1"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3b8ab5d-b594-456c-8fb0-92c5437b4752"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="825c762e-3693-4361-b4aa-7557b9aa6e7d"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d74c20ba-e3ad-4be3-a989-942bd142172d"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction
, IBM developerWorks (Java technology), 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="581530f2-f414-48b7-8a6a-d9e3fd616c79"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="555c3c65-1843-438e-ba88-2db82679f8d7"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5ca47d0-2281-48a0-bcec-503ab211ab2e"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30383eeb-9d61-41ae-9786-7089e17a1d87"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e25ddc2-8e2c-40d8-bcb8-faec886b6fb6"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7c31520-a083-40c5-92c6-d40c68244094"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a322c12-2bf8-4829-9a29-a103ec5580a9"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c890740-9920-4faa-8fd4-8b4d0034751b"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe4d6f9c-a0a8-46f6-a513-3353b124d169"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic
, Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b483f98-0ed8-427f-b976-228dc1895052"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e91a1aa1-0a87-43d4-9845-af9914a2713e"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8ed5868-971b-4a2e-8dfb-feaf0db9a503"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API
, Sun Developer Network (SDN), 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f864df51-c8b3-48ef-847c-632e8d956b78"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b3107d0-fe81-4755-82c5-dc20c6757f4e"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1319771-961a-4705-b16a-da4dc8bb77b0"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI
, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4bfb359-2339-4563-873f-5dcbc0f1752e"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e8a2e8d-6cf2-414d-997a-3077906c08a9"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57107014-056a-4950-bf83-2d7339331c26"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java⢠Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ca328b0-b69b-4f3c-ae33-e1b0d300f015"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips
, March 28, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afb3feb8-f4f0-4770-9671-c87e688c8943"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips
, January 30, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4b4e851-cc53-4461-87d7-ce6935b8699d"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de66198f-d844-461b-a488-d211af976620"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b5d76be-3363-444e-96f1-af3a8c84ff73"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48a4d24c-105c-406f-ab49-02d07342e4a4"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
, Sun Microsystems, Make it Fly 2008, London. 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7a08485-1660-4357-84d0-5a159fd44335"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d166f8a-b8a9-4bd1-81bc-5ca9ae56fe59"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d827c26-05fa-42ac-98a6-be92aee47d5c"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java⢠NIO_, O'Reilly, Sebastopol, CA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43faef2f-5f37-457f-af7f-47a1ba43a969"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java⢠Globalization
,JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60fdf865-e268-4b1b-8bf0-5f52e0b81248"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed5515a6-8b30-4ff8-8041-5d1ff983e402"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code
, 2nd ed., Microsoft Press, Redmond, WA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8890ff4d-6c64-4316-9638-48a690945fe3"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29925eff-79ac-46b5-9cbd-b88bd4fa0f4e"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0892545-0aca-4151-b29e-3050dd81bd03"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58ce27f5-e6f8-447e-b9b4-9d5366666b7d"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8cabafd-5174-4ca8-909a-45683db804db"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ea8d733-589d-4b4a-a807-dc12227a8f14"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corporation, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9a4a2fa-c9a5-4d0a-bc72-018562d24033"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f0cac7a-62ab-42f9-905d-fa9e7df41df3"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="601b8517-8c28-45a5-a591-e0522d17ddea"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b223c9b-579b-44c3-9789-9761d9cdf03d"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e85de17-9f85-445a-9d45-138586e79b5e"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13461fd6-2ea7-4cfb-8783-2b5748ab8b50"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32bda391-a0f6-40a5-875d-890e66b911e4"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, December 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08e3d7f1-db8f-4dba-b51b-3e306a22c90a"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification
, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83810ea2-f79b-43e4-97fa-8834551720ae"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ba7a565-7894-44a1-9f74-983b73faebcf"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6784a796-31b4-4819-9cb4-27556c4111c7"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45bdf631-8175-4ec0-9696-7f68cbb8ab29"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.258-263, May 21-24, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f774f73-b94a-454e-8230-b6e587d0790b"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58c178e8-e6b9-4afa-9ad0-418ea008f7b3"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Ken Arnold, James Gosling, and David Holmes, _The Java⢠Programming Language_, 4th ed., Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78dc755e-cbcc-45cd-a2e4-760d6a5b3c33"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88c2e57c-9779-4a92-994a-48e997d113f3"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95835225-f87b-4351-aa17-05894181d6f1"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a97973d-8667-4d5d-b6d4-cb5f26c82a01"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Jevgeni Kabanov, The Ultimate Java Puzzler
, February 16th, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97e73acb-62fe-434a-ba07-7f35e55bf2a8"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Heinz M. Kabutz, The Java Specialists' Newsletter, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af6a3928-f9b5-4286-974b-6be229626803"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Alex Kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1989e7df-34b5-4b0f-bcb6-9b5dbe18971a"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Kirk Knoernschild, _Java⢠Design: Objects, UML, and Process_, Addison-Wesley Professional, Boston, MA, 2001.
[Lai 2008] Charlie Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d91b1a1-2db9-4cc6-bd02-b6dbbfa63265"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Angelica Langer, Practicalities – Programming with Java Generics
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6bedd32-cb66-428b-abe9-412d8617addd"><ac:parameter ac:name="">Laplante 05</ac:parameter></ac:structured-macro>
[Laplante 2005] Phillip A. Laplante, Colin J. Neill, Antipatterns: Identification, Refactoring, and Management
, Auerbach Publications, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2f59683-ed5d-45a3-affc-d7bf94c7bec5"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000a] Doug Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c36f6ff-fde2-4eb8-9f49-d4756d9f2655"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Doug Lea and William Pugh, Correct and Efficient Synchronization of Java⢠Technology based Threads
, JavaOne Conference, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="626b4f75-b105-4f19-878f-02d59bb33313"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Doug Lea, The JSR-133 Cookbook for Compiler Writers
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7509fc31-09ef-40d0-82a1-05d23cb2ba9a"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Sangjin Lee, Mahesh Somani, and Debashis Saha, Robust and Scalable Concurrent Programming: Lessons from the Trenches
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5196d01e-c2eb-46ce-b4d7-5af991817fd4"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Sheng Liang, _The Java⢠Native Interface, Programmer's Guide and Specification_, Addison-Wesley Professional, Reading, MA, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad5a5c43-1ca3-4fb8-8841-0dfce811051d"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Sheng Liang and Gilad Bracha, Dynamic Class Loading in the Java⢠Virtual Machine
, Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="790a5c9d-833c-4cc6-b351-f3f13357bd06"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Henry Lieberman, Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
, Proceedings on Object-Oriented Programming, Systems, Languages, and Applications, pp. 214-223 (ISSN 0362-1340), Massachusetts Institute of Technology, 1986.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="531f303c-98ae-47ff-bc3b-782f87bb70ad"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Chia-Tien Dan Lo, Witawas Srisa-an, and J. Morris Chang, Security Issues in Garbage Collection
, STSC Crosstalk, October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45c32d23-af81-4c00-aaba-6739bd83dcbc"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Fred Long, Software Vulnerabilities in Java
, CMU/SEI-2005-TN-044, Software Engineering Institute, Carnegie Mellon University, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e49175e-df78-4d4a-94c6-e2eccb870b36"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group, Java and Java Virtual Machine Security
. Poland: Last Stage of Delirium Research Group, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d431101f-375b-4a5c-83a1-a8311be5932b"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Douglas Low, Protecting Java Code via Obfuscation
, Crossroads Volume 4, Issue 3, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2f12a08-e066-4dfc-92e0-4d66761bace0"><ac:parameter ac:name="">MacGregor 98</ac:parameter></ac:structured-macro>
[MacGregor 1998] Robert MacGregor, Dave Durbin, John Owlett, and Andrew Yeomans, Java Network Security, Prentice Hall PTR, Upper Saddle River, NJ, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fbf9d3a-bae9-499b-9724-4302a295139a"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Qusay H. Mahmoud, Compressing and Decompressing Data Using Java APIs
, Oracle, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57d2a18e-a204-4ca2-8aeb-2c5f1c004c6e"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Ronald Mak, Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2c1b142-b38b-4284-bf5d-b3d0a59c143b"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Jeremy Manson and Brian Goetz, JSR 133 (Java Memory Model) FAQ
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f35f180f-af35-4f94-9a34-b6079bbb4a5c"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Jeremy Manson and William Pugh, The Java⢠Memory Model: the building block of concurrency
, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80762af7-de6d-4270-9761-3bea50227f59"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Robert C. Martin, Granularity
, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04372c3c-c5d8-4bbe-8964-69f738e4b1ce"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Glen McCluskey, Java Developer Connection Tech Tips, April 10, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="224abd00-111f-4c1a-88a8-3673ed08a1ed"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Gary McGraw and Edward W. Felten, Securing Java, Getting Down to Business with Mobile Code, Wiley, New York, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="831d7571-74c0-43d4-98b1-3f06d5ffd126"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Gary McGraw and Edward W. Felten, Twelve rules for developing more secure Java code
, JavaWorld.com, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="784a3b18-14b0-4e09-8015-fcd9130a31df"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3522d13d-d254-4c79-b2a6-bde0bd0931fd"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java
, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI=10.1145/1814217.1814224, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad5ec088-c89a-4859-950b-58e700960e6e"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Alex Miller, Java⢠Platform Concurrency Gotchas
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05e7725b-29df-48ff-abb1-e75686c96994"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] MITRE Corporation, Common Weakness Enumeration
, 2011. Available at http://cwe.mitre.org/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0158c5b6-7b16-422d-922e-62e3f0d4d49f"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="768733fe-ff8b-45a4-ba47-d671c7f5ec9c"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Jan P. Monsch, Ruining Security with java.util.Random
Version 1.0, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3009facf-ab86-4fd7-a0aa-ee8706a6bce0"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft Corporation, Using SQL Escape Sequences
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9dfbdca-e548-4c3a-a81e-8ce0fd88ef82"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] John W. Muchow, MIDlet Packaging with J2ME
,ONJava.com, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daeef982-7ea2-41cf-aa76-ab67d91dc302"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Dr. Andreas Müller and Geoffrey Simmons, Exception Handling: Common Problems and Best Practice with Java 1.4
, Sun Microsystems GmbH, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98ff6d7f-0994-4cea-8136-31b561f31e62"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006a] Maurice Naftalin and Philip Wadler, Java Generics and Collections, O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bc98eb6-7049-499e-9447-58bde6391b82"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Maurice Naftalin and Philip Wadler, Java⢠Generics and Collections: Tools for Productivity
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6edf0fd0-00a3-42fa-85e3-489a77ebf126"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Robert H. B. Netzer and Barton P. Miller, What Are Race Conditions? Some Issues and Formalization
, University of Wisconsin, Madison, 1992.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96570795-3683-4b28-af04-b0fd75c60bfb"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Ted Neward, Effective Enterprise Java, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd7c928b-dde8-45b0-9ffa-e51ebe427a64"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Jeff Nisewanger, Avoiding Antipatterns
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02e7b18b-2ec8-44ac-89e2-c174e1c191a5"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Godfrey Nolan, Decompiling Java, Apress, Berkley, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f1ede60-660c-4d44-b6b4-946e9680afb3"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Scott Oaks, Java Security, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="434d7efe-e038-4993-90bc-97a84f1295d1"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The IEEE and The Open Group, The Open Group Base Specifications Issue 6
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d69a0364-21ad-4292-acb2-9408eeb20c1f"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Oracle Corporation, Java SE 6 HotSpot⢠Virtual Machine Garbage Collection Tuning
, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9391e514-57eb-4650-b6a9-ff76cb0e2a1b"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] The Open Web Application Security Project, A Guide to Building Secure Web Applications and Web Services
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="388507a5-730c-4122-bf61-7998c7a52b2f"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] The Open Web Application Security Project, OWASP Top 10 for Java EE
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b71cc5b3-24ee-4180-be28-36e2fae45221"><ac:parameter ac:name="">OWASP 11</ac:parameter></ac:structured-macro>
[OWASP 2011] Open Web Application Security Project (OWASP)
, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ef171e3-c329-441b-8e9a-29f2a318afb1"><ac:parameter ac:name="">PCI 10</ac:parameter></ac:structured-macro>
[PCI 2010] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard
, Version 2.0, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a012b377-85ae-4ab4-bb9e-95b5a88ceac6"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cc091c3-9ec3-4d3f-a988-1c678175eadc"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Paul Philion, Beware the dangers of generic Exceptions
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24f67794-e3e6-4bba-9de9-7728acf020e2"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Addison P. Phillips, Are We Counting Bytes Yet?
, 27th Internationalization and Unicode Conference, webMethods, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b679e83d-a4f1-4ecb-8f3b-bc1de21ea002"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1aa533a9-81ba-4afe-82c1-32273cb1e4e7"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Sun Microsystems, Default Policy Implementation and Policy File Syntax
, Document revision 1.6, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7da9f51-de34-4e51-99fb-aa94bb09f593"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] William Pugh, The Java Memory Model (discussions reference)
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70831d48-3208-4759-aa3e-9aea29dc2c84"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] William Pugh, Defective Java Code: Turning WTF Code into a Learning Experience
, JavaOne Conference, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c965b73c-a101-4a12-a676-bc56bdcb88e2"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] William Pugh, Defective Java Code: Mistakes That Matter
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4c97d93-85e9-441e-b10e-ecdc37ecbede"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, November 14, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9ec46eb-37b6-4cf1-a217-be347afdb8a8"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Sun Microsystems, Reflection
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="428f7f05-6805-45c0-9b6c-82fdc1205ae9"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson, The Elements of Java Style
, Cambridge University Press, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea497199-211f-4446-8d1a-152a4fa3786e"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Arnon Rotem-Gal-Oz, Fallacies of Distributed Computing Explained
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31bad9e0-79b0-4e4b-b9d2-26ece828ae76"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003a] Vladimir Roubtsov, Breaking Java Exception-Handling Rules is Easy
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd6b7601-b9d7-4d5b-90b1-0e31b47a5ea8"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Vladimir Roubtsov, Into the Mist of Serialization Myths
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fe1d476-a2ad-43be-872e-9a573862b912"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc242b9d-d22e-4f29-8431-8f90d2ddc240"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, Volume 63, Issue 9, 1975, 1278-1308.
Available at http://web.mit.edu/Saltzer/www/publications/protection/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f980350-ef33-410f-8fe5-9d10bf4e5f20"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Sun Microsystems, Secure Coding Guidelines for the Java Programming Language, version 3.0
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28e52bbf-d322-42dd-9e94-5e16d9b79e44"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt, Herb Schildt's Java Programming Cookbook, McGraw-Hill, New York, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9c106a0-6d05-4f2f-86e9-f62ab33796b0"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Bruce Schneier, Secrets and Lies---Digital Security in a Networked World, Wiley, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d02ac0a6-bd1b-4c0a-8538-6fca255c0c70"><ac:parameter ac:name="">Schönefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Marc Schönefeld, Security Aspects in Java Bytecode Engineering
, Blackhat Briefings 2002, Las Vegas, August 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eea96aed-9e0b-41bf-8d14-2c61d9626551"><ac:parameter ac:name="">Schönefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Marc Schönefeld, Java Vulnerabilities in Opera 7.54, BUGTRAQ Mailing List (bugtraq@securityfocus.com), November 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4f576cb-8656-475f-990e-c5a08c4cff2c"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Don Schwarz, Avoiding Checked Exceptions
, ONJava 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e1b3621-2877-4eff-8965-d52365301c31"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Dave Schweisguth, Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide
, Javaworld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25b1dc4c-c330-40d5-af8e-d859705926ea"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Microsystems,SUN Developer Network
, 1994-2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c373884-dd9b-431c-8253-12aebe49eb37"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++
, Addison-Wesley Professional, Boston, MA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d06e2a09-b3ec-46d6-b363-e961770472ec"><ac:parameter ac:name="">Seacord 08</ac:parameter></ac:structured-macro>
[Seacord 2008] Robert C. Seacord, The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston, MA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="812bf27b-4557-4fa1-89cf-29d0b47131ba"><ac:parameter ac:name="">Seacord 10</ac:parameter></ac:structured-macro>
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc8f566a-a984-4079-982c-38295aec89b2"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Sun Microsystems, Java 2 Platform Security Architecture
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89f53589-b919-44e7-b114-aa95fbdb51a1"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia ApS, Secunia Advisories
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54f26339-295e-45f7-b7d0-d2723fcaac38"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb588c48-5bf6-48d2-a2bc-c51cc88197d6"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Sun Microsystems, Java Security Architecture
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afc659ca-ef08-4f7c-b592-9f72f57c5200"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Robi Sen, Avoid the Dangers of XPath Injection
, IBM developerWorks, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db364979-3c92-4c27-b41d-196e7c456d42"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Christopher Steel, Ramesh Nagappan, and Ray Lai, _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_, Prentice Hall PTR, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52a76375-1a93-4cc7-ac3c-6d6399e39d76"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] G.L. Steele, Arithmetic Shifting Considered Harmful
, ACM SIGPLAN Notices, Volume 12, Issue 11 (1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4fe663d-e88b-4e9e-888b-18a89fbf2d68"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Daniel H. Steinberg, Java Developer Connection Tech Tips Using the Varargs Language Feature
, January 4, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37435af1-b0a2-46cd-a1d7-65ec57456cb6"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Andreas Sterbenz and Charlie Lai, Secure Coding Antipatterns: Avoiding Vulnerabilities
, Sun Microsystems, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac6de1a3-b81c-474a-8405-70b0988df135"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Gregory Steuck, XXE (Xml eXternal Entity) Attack
, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad2e1484-697c-4067-9b52-29c7d8c22ca8"><ac:parameter ac:name="">Sun 99</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3212f573-4b9c-4459-8846-0153dd99a8ae"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 2002] Reflection
, Sun Microsystems, 2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c62baf13-269d-4c65-b0e9-38ecf1808d69"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun Microsystems, Sun ONE Application Server 7 Performance Tuning Guide
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffacb262-2f76-4d11-bbc2-3332c6885840"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 2004a] Java Management Extensions (JMX),
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e8e5ebb-b945-4c19-be09-7043e22e5d57"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 2004b] Java Object Serialization Specification
, Version 1.5.0, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f51f285a-16d2-40c8-9e39-dd30b26d7c09"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 2004d] JVM Tool Interface
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89559c36-4e31-4f49-9245-68ab97989aee"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4e7698e-8ae1-4a95-8da0-a840685d2aff"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65a257ce-6e68-4025-b002-93c970c1be9b"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Dean F. Sutherland and William L. Scherlis, Composable Thread Coloring
, Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Association for Computing Machinery, New York, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3119c71e-7d02-4784-9cd0-533852d8b858"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum and Maarten Van Steen, Distributed Systems: Principles and Paradigms
, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f783dc6a-fa2d-4ad1-b069-646681af6975"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Josh Bloch and William Pugh, The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e27335d2-f02e-4715-997a-e4d568a33a30"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Apache Software Foundation,Changelog
and Security fixes
, Tomcat documentation, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e66f7d3d-3e0d-4fa1-9396-0736774ace76"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa9a4452-5328-4ac1-90f8-960b22ae678e"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium, The Unicode Standard, Version 4.0.0, defined by The Unicode Standard, Version 4.0, Addison-Wesley, Reading, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="593c4302-2ec1-4549-b230-cc0b60d33345"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007] The Unicode Consortium, The Unicode Standard, Version 5.1.0, defined by The Unicode Standard, Version 5.0, Addison-Wesley, Reading, MA, 2007, as amended by Unicode 5.1.0
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f1c3e47-a731-4708-84f8-63bbb122a4c9"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium, The Unicode Standard, Version 6.0.0
, The Unicode Consortium, Mountain View, CA, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3f36c6a-6c3e-4bb1-b22c-0a38d600fd87"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Bill Venners, Security and the Class Loader Architecture
, Java World.com, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="604b1cdd-c42a-4902-aac5-29a59fdb38ff"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Bill Venners, Failure and Exceptions, A Conversation with James Gosling, Part II
, Artima.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ebcbc87-16dd-4caf-9423-51afcd6984b6"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau, Extensible Markup Language (XML) 1.0
, 5th ed., W3C Recommendation, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c283e7c-a141-41d7-a60c-f69cb58e14b7"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Michael S. Ware, Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Masters thesis, James Madison University, Harrisonburg, VA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73b9e34a-87ff-465a-8e66-72ca121a5071"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Chris Weber, Exploiting Unicode-enabled Software
, CanSecWest, March 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="325389a2-4b74-4e8e-987e-6964e35c8cde"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] David A. Wheeler, Secure Programming for Linux and Unix HOWTO
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08660e94-24c4-4a07-84dd-d0339b0b0182"><ac:parameter ac:name="">White03</ac:parameter></ac:structured-macro>
[White 2003] Tom White, Memoization in Java Using Dynamic Proxy Classes
, August 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f194ce3d-13f4-4322-8876-90d1b21bcaeb"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] John Zukowski, Creating Custom Security Permissions
, Java Developer Connection Tech Tips, May 18, 2004.