<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69217204-b1cd-4080-ab17-904005463773"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="341dcd01-0651-4ff8-abc5-c9a6f6f33312"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f20836c0-f940-4a0f-81c8-6033a8cc43e0"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform
, Addison-Wesley Longman, Boston, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64555187-0465-4299-ad11-9cc6ef9df4c9"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e20006a-1d85-424e-afa5-b0b7ce524c39"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c23dfc2-3cdf-49d0-af6e-51939a4b5fbd"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fee56df1-fe9f-4989-a008-8064fda11e42"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="474b8173-7fdb-42e6-8140-c9ff877a0ea8"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers
, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9ae9e6c-7996-45fc-98d0-47d4085e28c6"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java⢠Reloaded: This Time It's (Not) for Real
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e548c7c-a36f-4d06-87eb-201dadff71da"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1768228a-f662-40e6-b7d8-aacdfd5ed552"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddba2c5d-12ce-4c89-8aea-8b0e43b25dd8"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java⢠Technology-Based Memory Model, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36c71074-11c0-4402-b941-04f0e4960c6a"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet
, Addison-Wesley, Reading, MA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41e72b1f-57a6-40f5-92b6-6a6f09dcb87b"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="152a9cca-41c6-4ffa-a5be-158aa8c15fc1"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a459a971-ad16-432f-a6fe-5f1188709695"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f79ab154-2355-4fc4-bf90-1bcb4f29b6f1"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ec7de70-811a-4475-8d23-44a899a155e0"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, Volume 14, Issue 10, 1981.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bd62b70-3b2b-4f2e-a85c-ccbe3c4f4afc"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
, Sun Microsystems, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3cc1eb9-45b3-4fab-8d39-30e1afb24228"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f99e78d-8511-4d7d-8078-fdb72aa82498"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming
, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de149571-a93e-4aee-a92b-e7ea1ac811eb"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java⢠2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9bac6c3-6c2b-4cd0-a51f-1e597c33dba6"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64b9811d-d0ce-497d-a2c3-9dea9361eac5"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't
, JavaWorld.com, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f992b67-9aff-4d73-b6b9-584311371954"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16727f1b-1fff-4540-a5fe-1d591b06896c"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1a96583-f387-417e-a7c2-1f10b0ad6801"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6980e44-d7db-4f2d-908e-3514da2c4e9e"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9f69ed3-076e-4d0a-9ac6-198b196deed3"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations
, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a5570f0-178a-4ebe-8373-e394b7c554d6"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In
, U.S. Department of Homeland Security, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7fa82c8-b853-4cf8-8ff0-590da73dcad1"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?
, CERT Vulnerability Analysis Blog, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4701b572-ec95-40ea-8894-16c4bf420119"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling
, ONJava.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6a2c286-2027-4c8d-85ae-3d125098dbbc"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns
, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fdc63e7-5750-45be-84ad-854787af8dd5"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3893b863-9420-4a06-a874-f4b85513e7dc"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e9e7ea6-439b-46e2-b1a5-64f32f2beacd"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture
, Sun Microsystems, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb2c556c-df04-41f9-98e1-8d93ebe5e3cb"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8edbbaf7-54fd-4cc6-85b7-127be7592485"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a2e747e-5be2-4df5-a63b-4e538b0e78cc"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6703990e-d204-41f2-904c-07520d81e5d2"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6419150-50a6-4805-a517-908568ea4f11"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10c6b693-65fd-4177-bc7e-29e5a17e98f2"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365ad875-82fa-48cb-808c-47758e332abd"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d186329-c350-479b-a3a3-d62b3cd6ddd1"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
, Java/JSP, Fortify Software, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fee14f02-7cda-445a-9a5c-5be29a2a6e34"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?
, Sun Developer Network, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4841c30-6a47-4bc1-ba30-5120c8dbc16a"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56b4604c-c512-4894-b4b4-13a4a089d980"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9f0bd1f-a43a-4b35-8d8b-d18065edca9e"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee2d9d0e-d0d1-423f-a173-1a1558b3d17e"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f75e69a0-9a45-483b-8b8a-de52e408f1c6"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a263889-f861-4c89-a09c-222acad1fb24"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction
, IBM developerWorks (Java technology), 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c43c7e54-ca43-4d24-9a48-9aee4d3a7d52"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8019326-06e6-45b5-8467-a78b6932bbde"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44d8dab1-0003-422f-b795-b939b8f82970"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8355372a-40ef-4ed5-926f-930ff4801991"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae160f77-62e3-4815-a213-e5980ec6187f"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="962c51ac-0d86-45f4-83de-b826e15992c5"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12e9fca7-38d2-4b6b-b912-e74dd94272f7"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b913d04c-12b5-47f3-a331-c58b0e017d9f"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d97cf91-b529-46e2-bdf1-88c24e3b0df1"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic
, Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="639968d4-c594-4341-96f3-a7b155d5bb95"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc62cea5-9fb4-4322-ac3d-d6935efebd28"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85bd60ad-c429-4885-a316-69d13389462a"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API
, Sun Developer Network (SDN), 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17bf2b2b-e1e8-47ca-bf9e-31ecbb14f0e4"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b017080a-09b0-4294-a9ee-edc9770e0df5"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dda3704-02c1-465f-b4eb-4d0cffc436cb"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI
, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c660ddc-b9f0-427c-b490-25d0cf7d6518"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad096d6f-f136-4e09-9ef1-a11423448305"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2107244f-f5f2-42ff-b58c-260cf3927805"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java⢠Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f1f97ef-3d07-4ff0-94f0-211f64fb9476"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips
, March 28, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7c83c6e-f068-4109-a42d-38b7fab8ef0c"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips
, January 30, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa2394f8-b4de-4494-b525-6c5c99732955"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4b22bf4-03f6-4288-97a8-408e3a5a4018"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c47b5c2d-e28f-4442-a686-659cea3f74d7"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f71c6d64-6af6-4106-bf44-6ef05c0ed7a2"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
, Sun Microsystems, Make it Fly 2008, London. 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21b3f228-0b72-4e81-8f66-7d4e197147f9"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="240cf7a5-28b3-4fe9-bec5-35b4eaf455fe"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7761911-9465-47ee-b979-7e7633a0980a"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java⢠NIO_, O'Reilly, Sebastopol, CA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef5da2df-a91f-45bb-b301-1f16809313f9"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java⢠Globalization
,JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="531368e4-4101-4759-bc17-7fbb58da32a0"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3213dcb0-1521-4966-8b56-4bf6f70e57ae"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code
, 2nd ed., Microsoft Press, Redmond, WA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aef4aa88-629f-4097-8ca6-d59be7859cd7"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cdf3ebd0-87ef-4a76-894c-9addfabf644c"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04528605-9957-4ba9-ba07-40dc4dd71020"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d494490-1d01-49b5-b58c-ee16979b7273"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="668a6955-a063-461a-8cfa-c52e595103d4"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c24324a-7145-4d0d-8d48-8f14726a6371"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corporation, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3e57f74-8b2d-4e66-b229-05e867cf5709"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9cab834-5d4f-481e-834f-70b9d1b86535"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="189131f1-bd7f-4599-b924-417ea79ea292"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53056204-a375-4ca4-8e03-46732663188b"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17897f81-746d-4d04-bb23-812a829077b1"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36893583-478e-44f1-8409-61360c6b3cab"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70bd3237-1115-41cb-bf7a-7783fe1f1967"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, December 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83ea1b25-5d96-44b8-90a7-0bd9a593c2fb"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification
, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bf2c521-4db8-48d4-9387-53ad3d062d9c"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cc2fd7c-d4f6-413a-b7d5-d9e24a90eced"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f067a4f-d272-47f3-a739-a1c1c60376cb"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="128dc61a-89e3-4fbc-9a1e-d2ff2258887c"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.258-263, May 21-24, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f13a727f-b795-4b8d-8f96-4f43949cfc77"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e51c1d6c-2611-4a0c-8bee-8bea311a4efd"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Ken Arnold, James Gosling, and David Holmes, _The Java⢠Programming Language_, 4th ed., Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64f68af4-6a9d-4f59-9026-4e3fb9e3d175"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08478871-de3d-4d99-9b0a-73248a856aa7"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51c41c53-8eac-4e4f-a9d8-032bbe9afc57"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6c24cea-956b-47f0-9093-5c59767166b8"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Jevgeni Kabanov, The Ultimate Java Puzzler
, February 16th, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="530ac56c-3188-4a54-9524-7fd38df6cb89"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Heinz M. Kabutz, The Java Specialists' Newsletter, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1fc9e8b-76c3-4d84-980d-e6b31171e6fc"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Alex Kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2732f0b-188b-4834-a07b-aa9c78aca416"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Kirk Knoernschild, _Java⢠Design: Objects, UML, and Process_, Addison-Wesley Professional, Boston, MA, 2001.
[Lai 2008] Charlie Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5164532-ebfd-4990-9cab-63d407d185ae"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Angelica Langer, Practicalities – Programming with Java Generics
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c99d9c7-97e8-41cd-aa33-7ae2de61521d"><ac:parameter ac:name="">Laplante 05</ac:parameter></ac:structured-macro>
[Laplante 2005] Phillip A. Laplante, Colin J. Neill, Antipatterns: Identification, Refactoring, and Management
, Auerbach Publications, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="346970ef-342c-4613-8dfd-4dc7a42b629c"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000a] Doug Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5690983c-a03c-401d-af31-73a151a60bc1"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Doug Lea and William Pugh, Correct and Efficient Synchronization of Java⢠Technology based Threads
, JavaOne Conference, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4438eaff-9c21-4b17-8180-a4a0293bd2f2"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Doug Lea, The JSR-133 Cookbook for Compiler Writers
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55d04dc2-5b38-41cf-8dd6-e6133f2e8467"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Sangjin Lee, Mahesh Somani, and Debashis Saha, Robust and Scalable Concurrent Programming: Lessons from the Trenches
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="952a2fc0-2fe7-4401-b5fd-9c724231a90a"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Sheng Liang, _The Java⢠Native Interface, Programmer's Guide and Specification_, Addison-Wesley Professional, Reading, MA, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="056d243d-dd1b-47ea-9d3b-bab1d14a3f7f"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Sheng Liang and Gilad Bracha, Dynamic Class Loading in the Java⢠Virtual Machine
, Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1eea46f9-19aa-4e60-a90f-0c0a57fc9cfc"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Henry Lieberman, Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
, Proceedings on Object-Oriented Programming, Systems, Languages, and Applications, pp. 214-223 (ISSN 0362-1340), Massachusetts Institute of Technology, 1986.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a124e00d-465a-44e4-a2a3-5d414d8593f8"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Chia-Tien Dan Lo, Witawas Srisa-an, and J. Morris Chang, Security Issues in Garbage Collection
, STSC Crosstalk, October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f9f60c9-bbbe-4649-98b3-62ddffcbbad8"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Fred Long, Software Vulnerabilities in Java
, CMU/SEI-2005-TN-044, Software Engineering Institute, Carnegie Mellon University, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="763854a5-208e-4ab8-9b5f-472f6f30e115"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group, Java and Java Virtual Machine Security
. Poland: Last Stage of Delirium Research Group, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07617831-64ce-4a28-aed2-8aae03b6aa07"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Douglas Low, Protecting Java Code via Obfuscation
, Crossroads Volume 4, Issue 3, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90507f31-92c8-4666-9025-8c913c3641f0"><ac:parameter ac:name="">MacGregor 98</ac:parameter></ac:structured-macro>
[MacGregor 1998] Robert MacGregor, Dave Durbin, John Owlett, and Andrew Yeomans, Java Network Security, Prentice Hall PTR, Upper Saddle River, NJ, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65df7950-db28-461f-80f4-75f60596248a"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Qusay H. Mahmoud, Compressing and Decompressing Data Using Java APIs
, Oracle, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c0dd95c-c046-45c7-a8c2-3fc9289513a2"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Ronald Mak, Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22c4c224-cccb-4dd7-9c96-466dbe5c2fab"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Jeremy Manson and Brian Goetz, JSR 133 (Java Memory Model) FAQ
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef951f4e-2a8f-4475-bb42-a907b94ba39b"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Jeremy Manson and William Pugh, The Java⢠Memory Model: the building block of concurrency
, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4fa0c98-4191-4962-9583-cd7f4c451bd5"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Robert C. Martin, Granularity
, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3692ff3-a638-41a6-a3db-6fa836eaf48a"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Glen McCluskey, Java Developer Connection Tech Tips, April 10, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1d12092-b6b9-4007-a665-6b191dca6d9c"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Gary McGraw and Edward W. Felten, Securing Java, Getting Down to Business with Mobile Code, Wiley, New York, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8f5c436-35f6-4601-9c21-3318db68b82b"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Gary McGraw and Edward W. Felten, Twelve rules for developing more secure Java code
, JavaWorld.com, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9e5ae53-7ad3-45aa-b9a2-0e8ffb6c43f4"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac4f0891-267b-4981-acd5-6814fce7a050"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java
, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI=10.1145/1814217.1814224, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85b87f40-ab0c-4906-9f7c-62b515f81752"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Alex Miller, Java⢠Platform Concurrency Gotchas
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d9c811d-edaf-4e86-b1cf-b5118a0c2af6"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] MITRE Corporation, Common Weakness Enumeration
, 2011. Available at http://cwe.mitre.org/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31b35f6a-4bc0-4ba9-ad29-cbee56abe04d"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b4fd2fe-3d33-4a2d-a766-fefd275c049a"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Jan P. Monsch, Ruining Security with java.util.Random
Version 1.0, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="488dfe82-d347-43f6-bfe3-da6471ad03a5"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft Corporation, Using SQL Escape Sequences
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3263e67-3f06-41ae-bc96-1ce5aea082d2"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] John W. Muchow, MIDlet Packaging with J2ME
,ONJava.com, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00164fb0-1239-45be-b94e-fa8d67b9424b"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Dr. Andreas Müller and Geoffrey Simmons, Exception Handling: Common Problems and Best Practice with Java 1.4
, Sun Microsystems GmbH, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a6ee730-e4d7-4d70-8471-570e2fcc0208"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006a] Maurice Naftalin and Philip Wadler, Java Generics and Collections, O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="679fe6fd-a44d-4a73-a1dc-e32b402e3117"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Maurice Naftalin and Philip Wadler, Java⢠Generics and Collections: Tools for Productivity
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="498852ce-c612-425f-8a55-9303caf505d4"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Robert H. B. Netzer and Barton P. Miller, What Are Race Conditions? Some Issues and Formalization
, University of Wisconsin, Madison, 1992.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59ce2093-98df-4568-8a20-cfe14d36f20a"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Ted Neward, Effective Enterprise Java, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a771a4e1-f9bf-4762-90d6-80cec49e820f"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Jeff Nisewanger, Avoiding Antipatterns
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4dca4ed9-835b-4f47-8498-2be3e2dfb176"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Godfrey Nolan, Decompiling Java, Apress, Berkley, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d18ecb4-60b1-49ab-8188-6c8d016cfd21"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Scott Oaks, Java Security, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97816ff1-4ef7-4ab8-b9bb-ac84c48d2922"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The IEEE and The Open Group, The Open Group Base Specifications Issue 6
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8858dd66-c861-403a-8b60-c23507fe6b5a"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Oracle Corporation, Java SE 6 HotSpot⢠Virtual Machine Garbage Collection Tuning
, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dd5a2b5-9ec7-4fe7-8751-1b456c295c38"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] The Open Web Application Security Project, A Guide to Building Secure Web Applications and Web Services
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0454492b-535b-4043-bfd6-5c8541e20f8d"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] The Open Web Application Security Project, OWASP Top 10 for Java EE
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b00fa748-c277-4dcd-9dca-94f9587a1ad2"><ac:parameter ac:name="">OWASP 11</ac:parameter></ac:structured-macro>
[OWASP 2011] Open Web Application Security Project (OWASP)
, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f815f17d-3160-45e6-bf2a-f294d470f94f"><ac:parameter ac:name="">PCI 10</ac:parameter></ac:structured-macro>
[PCI 2010] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard
, Version 2.0, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2c04d15-7900-461b-a1d6-35ba7af6efd7"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f49d1eb-f8e5-4f56-a68c-7e8b3dccafcb"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Paul Philion, Beware the dangers of generic Exceptions
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85ac52af-3f66-4d7c-8f87-8c01cfb302a0"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Addison P. Phillips, Are We Counting Bytes Yet?
, 27th Internationalization and Unicode Conference, webMethods, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3dba4c6-04c3-488a-b795-4cf39bcdd338"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ac34970-60c7-4fcc-b447-9120f78ee702"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Sun Microsystems, Default Policy Implementation and Policy File Syntax
, Document revision 1.6, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d896157-7ab7-4d8d-aa97-fad5d4c8583e"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] William Pugh, The Java Memory Model (discussions reference)
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0194cfa3-7f6f-4c65-8768-4a5cf3b0afc4"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] William Pugh, Defective Java Code: Turning WTF Code into a Learning Experience
, JavaOne Conference, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e0fc1b8-addd-4ba6-a68a-427f18e30567"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] William Pugh, Defective Java Code: Mistakes That Matter
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="755c378c-88e3-483d-b3f5-5dfd089bad0d"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, November 14, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78bcae12-8e93-407f-a598-4fb93fa7a36b"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Sun Microsystems, Reflection
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9e8f531-afa8-4fe9-a027-66ecf91af285"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson, The Elements of Java Style
, Cambridge University Press, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e142f87-e81a-4cb3-99e9-30b7f199d224"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Arnon Rotem-Gal-Oz, Fallacies of Distributed Computing Explained
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47cabfbf-a1f9-42e5-a08f-bb9dbeb4351a"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003a] Vladimir Roubtsov, Breaking Java Exception-Handling Rules is Easy
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45ccaf9b-dde5-479c-83e0-c7bb139e8fbf"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Vladimir Roubtsov, Into the Mist of Serialization Myths
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5162037-dd2f-44f5-8aa9-8ad19dfba737"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c30ce2b-8bb1-4233-8eae-aab5e232101d"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, Volume 63, Issue 9, 1975, 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2503e35b-de30-4840-97ca-838229c06f5e"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Sun Microsystems, Secure Coding Guidelines for the Java Programming Language, version 3.0
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80964499-19b2-478b-ad32-6195157e229a"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt, Herb Schildt's Java Programming Cookbook, McGraw-Hill, New York, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed5272ce-0cd7-4e6e-8ef3-f286d9565984"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Bruce Schneier, Secrets and Lies---Digital Security in a Networked World, Wiley, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8702e7e-1fb8-4a48-a4a6-1e36b7a26c0e"><ac:parameter ac:name="">Schönefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Marc Schönefeld, Security Aspects in Java Bytecode Engineering
, Blackhat Briefings 2002, Las Vegas, August 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48a15205-41b3-4673-9770-3a5d70858395"><ac:parameter ac:name="">Schönefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Marc Schönefeld, Java Vulnerabilities in Opera 7.54, BUGTRAQ Mailing List (bugtraq@securityfocus.com), November 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79640c2a-c42c-4ce0-9940-6ea1090396b9"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Don Schwarz, Avoiding Checked Exceptions
, ONJava 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7250108e-5f1c-4e33-8f3f-47ab5d0b6393"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Dave Schweisguth, Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide
, Javaworld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3430563-cee2-44ed-9359-eb2643e0fef4"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Microsystems,SUN Developer Network
, 1994-2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ccc55b3-20fa-42a3-8c51-c0a13bd70b08"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++
, Addison-Wesley Professional, Boston, MA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c5af374-39a0-4b4d-963c-1a69a2c39a69"><ac:parameter ac:name="">Seacord 08</ac:parameter></ac:structured-macro>
[Seacord 2008] Robert C. Seacord, The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston, MA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3880fb4-d43f-445e-a573-e88f10b75997"><ac:parameter ac:name="">Seacord 10</ac:parameter></ac:structured-macro>
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbd615f2-b826-48e3-a455-be015cee6b84"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Sun Microsystems, Java 2 Platform Security Architecture
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f10344e3-13b3-4779-8911-9c4935d8cb98"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia ApS, Secunia Advisories
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7b05f0f-395a-4773-b5f7-2d86ac5757ce"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b5572b4-dc39-45f8-bfc7-62ee7ae123ce"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Sun Microsystems, Java Security Architecture
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99b3629c-ad07-4289-940f-e853409f0f86"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Robi Sen, Avoid the Dangers of XPath Injection
, IBM developerWorks, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bddbeab-c096-48f9-bdf8-c2b3dbd7b9e3"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Christopher Steel, Ramesh Nagappan, and Ray Lai, _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_, Prentice Hall PTR, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd14ae6b-971b-4eb9-a468-5cbcd94a036f"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] G.L. Steele, Arithmetic Shifting Considered Harmful
, ACM SIGPLAN Notices, Volume 12, Issue 11 (1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f55e6b27-1958-4d79-a9d7-92b525a37ffc"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Daniel H. Steinberg, Java Developer Connection Tech Tips Using the Varargs Language Feature
, January 4, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e200eab-fda9-4a7d-83c0-598cad430bd6"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Andreas Sterbenz and Charlie Lai, Secure Coding Antipatterns: Avoiding Vulnerabilities
, Sun Microsystems, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7ce6468-2e59-45b2-b6fa-44da52655049"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Gregory Steuck, XXE (Xml eXternal Entity) Attack
, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="286ba2ae-24e5-4a31-853d-002ca101e8b8"><ac:parameter ac:name="">Sun 99</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83dc2185-2acf-45c1-9455-69e350aa8512"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 2002] Reflection
, Sun Microsystems, 2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="349914d2-72d0-4576-8314-94850dbc60d0"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun Microsystems, Sun ONE Application Server 7 Performance Tuning Guide
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c3e5cf3-7eab-4d51-b607-28d2b2fb5013"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 2004a] Java Management Extensions (JMX),
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ee16827-a57b-4d57-821b-42195a541b48"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 2004b] Java Object Serialization Specification
, Version 1.5.0, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="622e348d-0d5e-4cda-bd24-473eca3aefeb"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 2004d] JVM Tool Interface
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a7d4a4c-76b7-4651-baba-e550b220525e"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99b1e646-82f1-4af9-92db-b3f4a343270a"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9c836f7-4bb0-4627-b961-65813d3ee6e7"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Dean F. Sutherland and William L. Scherlis, Composable Thread Coloring
, Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Association for Computing Machinery, New York, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e16ed44e-813a-4227-b9a9-1f79806ff0db"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum and Maarten Van Steen, Distributed Systems: Principles and Paradigms
, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33152fce-8eab-4375-a170-d0d017d522b4"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Josh Bloch and William Pugh, The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="094be7e5-8a01-4a05-a313-a0ce1dc5367a"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Apache Software Foundation,Changelog
and Security fixes
, Tomcat documentation, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1a1c653-73bc-4065-b9b7-289690b36316"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4747b0d3-a6cb-4cc6-bbcf-1225552fec16"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium, The Unicode Standard, Version 4.0.0, defined by The Unicode Standard, Version 4.0, Addison-Wesley, Reading, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e5e5e65-92e9-405e-bde3-3fcbdbab34a1"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007] The Unicode Consortium, The Unicode Standard, Version 5.1.0, defined by The Unicode Standard, Version 5.0, Addison-Wesley, Reading, MA, 2007, as amended by Unicode 5.1.0
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90f6352b-bc6a-46e8-bfa8-1b8657b5cc1a"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium, The Unicode Standard, Version 6.0.0
, The Unicode Consortium, Mountain View, CA, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47ae204b-b37b-48c1-9c58-4e616c115194"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Bill Venners, Security and the Class Loader Architecture
, Java World.com, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbd8f295-20f5-48d6-82e7-8fa05191c3c1"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Bill Venners, Failure and Exceptions, A Conversation with James Gosling, Part II
, Artima.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cd88cfa-48f4-4c48-91a4-36b5c4e7aa5d"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau, Extensible Markup Language (XML) 1.0
, 5th ed., W3C Recommendation, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34fab0bf-a015-4739-9b8e-e3d588784228"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Michael S. Ware, Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Masters thesis, James Madison University, Harrisonburg, VA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5258d52-cade-4328-905d-09241a159826"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Chris Weber, Exploiting Unicode-enabled Software
, CanSecWest, March 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d04a05d-2a11-4bc4-849d-e58cbbedec9c"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] David A. Wheeler, Secure Programming for Linux and Unix HOWTO
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca7064d5-7ddf-4dc7-8eca-2201f490dd2a"><ac:parameter ac:name="">White03</ac:parameter></ac:structured-macro>
[White 2003] Tom White, Memoization in Java Using Dynamic Proxy Classes
, August 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abe67a55-8fe3-4a11-a391-3a0c63f84226"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] John Zukowski, Creating Custom Security Permissions
, Java Developer Connection Tech Tips, May 18, 2004.