<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf964491-7372-4232-908f-6716de7086d6"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9404a475-3a78-461c-b801-1cbb117f0d10"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca2e52c2-bee6-4e4c-8693-d147e6349fe7"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform
, Addison-Wesley Longman, Boston, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59f1bfb8-1747-41a1-9069-5561f090b620"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2d82eba-cc9c-43e4-b2ed-7ebcb9d572e3"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fcecee2-d3c9-4fd0-ac9d-0543f2d67b15"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f20e27e-1d34-4745-a6dc-375b8aac2b25"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5d572dc-15ba-433f-a2c1-c8e5317391f2"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers
, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8e9ce5f-2a36-4b7f-a667-f0bc633cd153"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java⢠Reloaded: This Time It's (Not) for Real
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eac976c3-0524-4d83-ae24-41c7a229d6f8"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e7e1429-238d-41c6-b419-e9cbf51219e5"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="279ed8e3-974f-40e4-90b8-4aa1fcb74651"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java⢠Technology-Based Memory Model, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db6d4ad2-efee-4341-95eb-2e41fc4d33fd"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet
, Addison-Wesley, Reading, MA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8aee59ea-7eea-4729-a355-7edee66867b1"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06e03c87-0a9f-4613-af57-657d72cf639c"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03af4686-8ba2-4382-9b01-07a93c65c3df"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ea07933-c655-4ea7-8ef3-93dfba7d7693"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23a82605-68b3-4861-b8b3-5ee9f288484d"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, Volume 14, Issue 10, 1981.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5d8ecda-4c43-43e7-885b-c40638f81d9a"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
, Sun Microsystems, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b265b57-9e37-4d71-960a-992f3fbf3064"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2c0f684-0d16-46dd-8aa0-9fb5a8589810"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming
, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b3d493a-2ae5-4e42-b66c-a667e185cb40"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java⢠2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7debef0e-dbd4-40c6-a1c6-bfb7ebebeb5f"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365d8a25-a1a7-43b9-9e3c-5e82503596e8"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't
, JavaWorld.com, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4d04418-ebc5-4e1e-8d11-a8333cd2aaf8"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efd52858-7cfc-4bd2-a388-efaa58d9f3c9"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68032416-08f7-4928-b2f0-136b311b6501"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f75b3e28-e853-4c5e-b652-9c2656f73e41"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c11cae8-75dd-4072-89ee-0221621555ee"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations
, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="140f29c0-bc4c-4757-9439-f5c0c361ed86"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In
, U.S. Department of Homeland Security, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a37e5ee-a98f-4946-a9f8-6a33d6f97bc7"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?
, CERT Vulnerability Analysis Blog, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe04fd79-1986-4614-9650-7d4b5ce1b5a5"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling
, ONJava.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6289df1c-62d0-4849-9c12-93376a736fd4"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns
, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acaf763f-0815-4644-943a-a85586b4708a"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b17bef96-e6e7-4bfa-94c9-398bcfe3de58"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63c5f7ec-df0b-4e91-922f-83eee8ea4d7f"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture
, Sun Microsystems, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="463c3219-4b2d-4675-a249-5928894904c8"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54eb8845-99be-4563-ac35-e1ed9108595b"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebb95d20-9287-47d1-844f-6c987ff30fd6"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f583ab6a-7ae9-4d27-ab35-c146c0f7473b"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab5382c5-8b92-4b0a-8b65-571e2fd77320"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="504ce877-e69d-4137-85db-f39b80676f8a"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3eab1c8-9c97-43a8-9a07-d818a398fe4f"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e365d6ee-3cc0-4cea-8fde-129eb038ebdd"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
, Java/JSP, Fortify Software, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a21b3df4-a44a-429d-a4ff-0ba6ec939ae2"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?
, Sun Developer Network, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c3c67a1-824b-4af0-8d72-97443521d0a3"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbc3d36c-ef91-401c-8276-3e5b21577ba9"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01dace35-37b5-4f3f-b252-8be3219b21c7"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4c49bb7-1452-4372-be64-81a39db062f8"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c681805-44f3-4b50-8f60-dc71c970fce1"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c520d5ec-ac9a-4069-a86f-286ce4af37c7"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction
, IBM developerWorks (Java technology), 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d50dcac8-709f-4ab8-917e-1b711b682722"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ccd5fc5-031c-494a-b7de-0b81dcce57ad"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b9bb32f-3a1e-4edb-812e-c7b06b3f459b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ddcb763-21ee-414f-a137-737ec8de4547"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03dac2a9-16dd-4190-8ab2-3d823738e623"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f6567b7-2dfb-4934-be96-83343632f6ac"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ffc89c9-9735-4720-9e48-5b06ed89c83a"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19b083d4-cbd4-4d26-b90c-fbe3a1d57795"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abc3dcaa-3cd4-4f23-8471-aca89703c39e"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic
, Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ec96770-5ae6-4f44-b775-50071b3d196e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="666437f9-d582-4921-9f18-3895f9d5f78c"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3eae44a0-2eaf-4cce-b278-522346575554"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API
, Sun Developer Network (SDN), 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00d697b1-cdbb-4875-82d3-ed5dfa258005"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c69306a8-5681-4a26-a2c1-2ddee8a04681"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48751afd-e5b5-4597-a34b-b53caa87c4d0"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI
, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61c72fc6-02a1-46bd-8721-1c9f0e473eb5"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c957860d-be40-426d-b03c-3b152aea43fc"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e103ef7d-d99c-45da-8bc6-ce4c839aba42"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java⢠Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af4a0e8c-302b-4cf8-8a90-fa20678968ad"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips
, March 28, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="820ca64b-0e43-4708-97c4-6e20410ca2cc"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips
, January 30, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8dcbcc9e-f535-4a8c-8124-151c91b7d20e"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08375995-0176-447f-be46-7c01df64a6ac"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5088307-a34b-461e-9f36-f5b4f2e8a1f9"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca66c75c-1af4-46e2-a83c-cd81b6ca93f8"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
, Sun Microsystems, Make it Fly 2008, London. 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3c3813a-7a4b-4aa7-a778-e733aace8915"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8145a32-ce7e-42a0-8f27-1151cfabe54b"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7154f3d-8ced-48de-bab2-65958885aad0"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java⢠NIO_, O'Reilly, Sebastopol, CA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="971a3f50-e986-40dc-bc9f-f5d3bb07f0d9"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java⢠Globalization
,JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45af6e93-8299-404d-bdbd-3e7c43509a91"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb162572-88ff-4090-9cd7-78c3677e0821"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code
, 2nd ed., Microsoft Press, Redmond, WA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab6e9de5-51ce-442c-99c3-b48329f3cd4c"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d9147c5-b6f7-4232-983d-e46951541be3"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="098458e8-f370-4e98-bc01-143335e5b1a4"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7199dd53-2302-415f-9d63-33cb72a1a967"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e745c7e-183b-4232-a239-5fad9e29ee99"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="604a8364-c271-460c-8843-7af8c5972163"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corporation, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8209515-40f5-4c8d-b7ac-0e55a21d53c4"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6e38322-2df3-4640-81d4-08aa3e28ff76"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0d2072f-c31d-4bd5-8cd2-2fd9c8c057eb"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f1d279e-0458-444b-ae1c-d4f224f5d4ff"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="945f2bac-0888-4408-8a39-afb45a0f1467"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34a833dc-8522-4e7d-8577-e6e8ac102cad"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c4780ed-2f32-41f7-b670-f23effc09d8f"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, December 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66bb0c04-da62-4cd9-8b87-201c845f6a0a"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification
, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47bba052-1c3d-4630-b821-12689156eb20"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b285c953-d1c3-4ade-99d3-2b90bbac8626"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67715935-3b4f-40a9-b971-476e8bf559a8"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee04859b-f33a-4ffb-a34e-bb6459d5c598"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.258-263, May 21-24, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a0a23f9-9b85-48b3-9308-f172216b2c3f"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="226da3c1-dd3d-4f0b-acc5-562eff0fa33e"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Ken Arnold, James Gosling, and David Holmes, _The Java⢠Programming Language_, 4th ed., Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb7ff315-bad3-4fb1-b6ba-9c8f1771da17"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b657ef41-4d90-4ce3-be9a-1480d401d0fa"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b049948a-deea-4f03-9500-cdd63d75d3fe"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fd66ddd-e80e-4e93-9cf6-2a2de266fea0"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Jevgeni Kabanov, The Ultimate Java Puzzler
, February 16th, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93b2c760-3e8d-49f4-94fa-3f3734be9729"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Heinz M. Kabutz, The Java Specialists' Newsletter, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="781987bb-1581-4a40-9bdf-6d2cab664afc"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Alex Kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8adfc2b-b15c-429e-958b-e94c53504e30"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Kirk Knoernschild, _Java⢠Design: Objects, UML, and Process_, Addison-Wesley Professional, Boston, MA, 2001.
[Lai 2008] Charlie Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18835a8e-6007-4410-83eb-cb3476da3ed7"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Angelica Langer, Practicalities – Programming with Java Generics
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d5e3c99-fb2d-48f6-a09d-7d900b06a547"><ac:parameter ac:name="">Laplante 05</ac:parameter></ac:structured-macro>
[Laplante 2005] Phillip A. Laplante, Colin J. Neill, Antipatterns: Identification, Refactoring, and Management
, Auerbach Publications, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7982f9e-9320-4a38-adab-65443eddabfb"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000a] Doug Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea898395-01b6-43c6-ae26-1a1939fd791f"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Doug Lea and William Pugh, Correct and Efficient Synchronization of Java⢠Technology based Threads
, JavaOne Conference, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc8c65fd-2b3e-4bcc-826f-9ac714f9730c"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Doug Lea, The JSR-133 Cookbook for Compiler Writers
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f7e7460-c2a8-472f-bc0d-a92af5d05761"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Sangjin Lee, Mahesh Somani, and Debashis Saha, Robust and Scalable Concurrent Programming: Lessons from the Trenches
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="942660b0-1aff-48ac-a00c-3e3d1fb3b9ac"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Sheng Liang, _The Java⢠Native Interface, Programmer's Guide and Specification_, Addison-Wesley Professional, Reading, MA, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7188ce7-ecaf-4f31-aab1-457114dad248"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Sheng Liang and Gilad Bracha, Dynamic Class Loading in the Java⢠Virtual Machine
, Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c750354-281e-4d98-bf7a-5a6ace219249"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Henry Lieberman, Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
, Proceedings on Object-Oriented Programming, Systems, Languages, and Applications, pp. 214-223 (ISSN 0362-1340), Massachusetts Institute of Technology, 1986.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc9f2b7f-8c7a-4a3b-8861-b0dc59a54851"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Chia-Tien Dan Lo, Witawas Srisa-an, and J. Morris Chang, Security Issues in Garbage Collection
, STSC Crosstalk, October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="239ce3f6-1efe-40ce-845b-c963bafec3c0"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Fred Long, Software Vulnerabilities in Java
, CMU/SEI-2005-TN-044, Software Engineering Institute, Carnegie Mellon University, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="929783f6-11d2-4f41-b908-c26233c60f5d"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group, Java and Java Virtual Machine Security
. Poland: Last Stage of Delirium Research Group, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="caa0dcf4-9fe3-4974-9811-72914cfe6f16"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Douglas Low, Protecting Java Code via Obfuscation
, Crossroads Volume 4, Issue 3, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42cb294d-9398-46aa-bfa6-3993298dc2e1"><ac:parameter ac:name="">MacGregor 98</ac:parameter></ac:structured-macro>
[MacGregor 1998] Robert MacGregor, Dave Durbin, John Owlett, and Andrew Yeomans, Java Network Security, Prentice Hall PTR, Upper Saddle River, NJ, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86cfb551-7b44-43ca-a76b-fd40a261eeb1"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Qusay H. Mahmoud, Compressing and Decompressing Data Using Java APIs
, Oracle, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c0bf431-436e-4e2e-bd24-c76a051cf47f"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Ronald Mak, Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c62b471-35bd-487e-be7d-d91a440adcde"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Jeremy Manson and Brian Goetz, JSR 133 (Java Memory Model) FAQ
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8279178f-bdaa-4e95-a265-5e583e0b0b54"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Jeremy Manson and William Pugh, The Java⢠Memory Model: the building block of concurrency
, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f6501a9-1374-467f-804b-e9936c7cac27"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Robert C. Martin, Granularity
, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f04bceac-4cf4-4c8e-980d-0a3fff7eab35"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Glen McCluskey, Java Developer Connection Tech Tips, April 10, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9673bf5-761f-4d82-868b-9e34213ca302"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Gary McGraw and Edward W. Felten, Securing Java, Getting Down to Business with Mobile Code, Wiley, New York, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8606075-518b-4278-b16e-f5dbeffb00da"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Gary McGraw and Edward W. Felten, Twelve rules for developing more secure Java code
, JavaWorld.com, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db729b29-9c19-4d1f-9168-930b251cfde3"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52eb62be-c706-48a0-8417-00fdb528f55e"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java
, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI=10.1145/1814217.1814224, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e3d6cf7-c1e4-46a8-a398-d783f04b7781"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Alex Miller, Java⢠Platform Concurrency Gotchas
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33b2f751-375d-4d94-97b1-9683b88fc56d"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] MITRE Corporation, Common Weakness Enumeration
, 2011. Available at http://cwe.mitre.org/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9ece8f6-771c-4a14-a8e3-986913f895a4"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fae3a150-ff58-4447-8bd8-89232c2fcb24"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Jan P. Monsch, Ruining Security with java.util.Random
Version 1.0, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd787fe8-31f9-4e73-8607-82fdeef47f8a"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft Corporation, Using SQL Escape Sequences
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f083d2c-8853-4b3b-ac44-819631353a99"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] John W. Muchow, MIDlet Packaging with J2ME
,ONJava.com, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fa8babf-4a6d-48da-a61c-e7f0ee786d7f"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Dr. Andreas Müller and Geoffrey Simmons, Exception Handling: Common Problems and Best Practice with Java 1.4
, Sun Microsystems GmbH, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed973481-6faf-49fd-b473-c80b274df970"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006a] Maurice Naftalin and Philip Wadler, Java Generics and Collections, O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c49a0c8-be85-4458-9b86-a861ea153188"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Maurice Naftalin and Philip Wadler, Java⢠Generics and Collections: Tools for Productivity
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74e774f8-9aa0-4030-9fae-f29eb5c31491"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Robert H. B. Netzer and Barton P. Miller, What Are Race Conditions? Some Issues and Formalization
, University of Wisconsin, Madison, 1992.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49d580e8-1ba2-4fbc-a6aa-a25d6ba7f918"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Ted Neward, Effective Enterprise Java, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee9fc543-45a6-4b82-8b78-d5f7ec26ae6f"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Jeff Nisewanger, Avoiding Antipatterns
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d00325d8-d4dd-4705-9e4d-118864bcbf85"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Godfrey Nolan, Decompiling Java, Apress, Berkley, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1667f428-231d-4c2a-92bb-67bf9ab2b866"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Scott Oaks, Java Security, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa4c840c-1796-4554-ba99-1e012e81be2e"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The IEEE and The Open Group, The Open Group Base Specifications Issue 6
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cc1c89f-321c-48b5-b170-031705fd4121"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Oracle Corporation, Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning
, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ba250cc-b708-4c51-a238-24d9c3b3a9f9"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] The Open Web Application Security Project, A Guide to Building Secure Web Applications and Web Services
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="515ff02e-5b05-452a-a728-fbdea6afedb2"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] The Open Web Application Security Project, OWASP Top 10 for Java EE
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fc2bb8b-fb49-4ede-944c-0a9033b8fd9a"><ac:parameter ac:name="">OWASP 11</ac:parameter></ac:structured-macro>
[OWASP 2011] Open Web Application Security Project (OWASP)
, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2986780-1843-4269-aaa2-08561737ef89"><ac:parameter ac:name="">PCI 10</ac:parameter></ac:structured-macro>
[PCI 2010] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard
, Version 2.0, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa11cf8a-94c7-4854-8e7e-74826c1b2743"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69d4fc13-9461-4ddb-9a5e-e96b7d608693"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Paul Philion, Beware the dangers of generic Exceptions
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35f47412-a21d-4b03-934b-69b333631e62"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Addison P. Phillips, Are We Counting Bytes Yet?
, 27th Internationalization and Unicode Conference, webMethods, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0fd0745-f8b4-4c83-87ef-79ef3c0da24c"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7b67c57-a710-48da-9515-bee7b560cb87"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Sun Microsystems, Default Policy Implementation and Policy File Syntax
, Document revision 1.6, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90834cdb-7a99-4999-aedd-954578d7153e"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] William Pugh, The Java Memory Model (discussions reference)
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="801fe1d7-077b-45f1-97b5-0c4531e3bbda"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] William Pugh, Defective Java Code: Turning WTF Code into a Learning Experience
, JavaOne Conference, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2724e891-f511-46ee-b157-f2f726eb3fe1"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] William Pugh, Defective Java Code: Mistakes That Matter
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ba09502-aeaa-4da4-b66a-5f727030893e"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, November 14, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78c23275-de13-4ff1-a3f5-8650ffc914d0"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Sun Microsystems, Reflection
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ef71612-2d84-41cc-9f48-d949f11c91dc"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson, The Elements of Java Style
, Cambridge University Press, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e17b0c8-dccc-45b9-a2b8-1e38b1faedf0"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Arnon Rotem-Gal-Oz, Fallacies of Distributed Computing Explained
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="817976fd-4818-47af-b8d7-7c3006ff4563"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003a] Vladimir Roubtsov, Breaking Java Exception-Handling Rules is Easy
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3064e4e9-b766-4ef8-9017-5664c9e9d8a6"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Vladimir Roubtsov, Into the Mist of Serialization Myths
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c611af36-1046-4f09-a9c4-c4566ed3245c"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="169435ea-9cdf-4975-9d23-968c5f19ca72"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, Volume 63, Issue 9, 1975, 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e92d1480-d5c1-4a89-b61e-f814dc9009af"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Sun Microsystems, Secure Coding Guidelines for the Java Programming Language, version 3.0
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6b96c74-ae69-45b0-9f3e-b56eda16dc23"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt, Herb Schildt's Java Programming Cookbook, McGraw-Hill, New York, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3ca75a6-16c7-40a7-996f-037e6b5c232e"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Bruce Schneier, Secrets and Lies---Digital Security in a Networked World, Wiley, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b456052-4e6f-43f6-a644-ff0298800fc5"><ac:parameter ac:name="">Schönefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Marc Schönefeld, Security Aspects in Java Bytecode Engineering
, Blackhat Briefings 2002, Las Vegas, August 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="016d2ee8-f3d4-4272-8b0e-b9ef36bba110"><ac:parameter ac:name="">Schönefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Marc Schönefeld, Java Vulnerabilities in Opera 7.54, BUGTRAQ Mailing List (bugtraq@securityfocus.com), November 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f34c4bbb-4558-406f-ad27-f5d1a261e3be"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Don Schwarz, Avoiding Checked Exceptions
, ONJava 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="294d14e3-c00f-4f20-aaee-84d89f6db7ed"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Dave Schweisguth, Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide
, Javaworld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8332978-f396-444f-ba17-61d2dba5a382"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Microsystems,SUN Developer Network
, 1994-2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04381ea4-3271-43b5-a1aa-9fc4633d2784"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++
, Addison-Wesley Professional, Boston, MA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2e9186e-2c35-46af-8493-6f5ece86fffc"><ac:parameter ac:name="">Seacord 08</ac:parameter></ac:structured-macro>
[Seacord 2008] Robert C. Seacord, The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston, MA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e886051c-f3e4-4613-b2d6-e18d86a457c1"><ac:parameter ac:name="">Seacord 10</ac:parameter></ac:structured-macro>
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c8fa73f-dfef-486f-a854-710b18aa2c1a"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Sun Microsystems, Java 2 Platform Security Architecture
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef063a23-65ea-4975-bb33-9411726d87a0"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia ApS, Secunia Advisories
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02f8eb79-4732-4ba0-9c39-e0169b504361"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d407340-e657-4ab9-98a1-e11f1d76e3c9"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Sun Microsystems, Java Security Architecture
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="902e24da-1c34-48ce-bb4e-e6f7018ef65b"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Robi Sen, Avoid the Dangers of XPath Injection
, IBM developerWorks, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d75d689-4cb1-445e-be47-998b9840a439"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Christopher Steel, Ramesh Nagappan, and Ray Lai, _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_, Prentice Hall PTR, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="934eba41-e889-43d7-9e36-8a6fa400880f"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] G.L. Steele, Arithmetic Shifting Considered Harmful
, ACM SIGPLAN Notices, Volume 12, Issue 11 (1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e5909c1-3ebd-4245-843e-a629ebbd05f5"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Daniel H. Steinberg, Java Developer Connection Tech Tips Using the Varargs Language Feature
, January 4, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0571a315-20ce-4f04-b7f0-58ba4b1bce9e"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Andreas Sterbenz and Charlie Lai, Secure Coding Antipatterns: Avoiding Vulnerabilities
, Sun Microsystems, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4821a0b9-4ea9-4809-9ece-82baf875eead"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Gregory Steuck, XXE (Xml eXternal Entity) Attack
, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ef6832d-fdf3-450d-9a6c-82227e37def0"><ac:parameter ac:name="">Sun 99</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b4001dc-88da-487b-9523-11b0a127d357"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 2002] Reflection
, Sun Microsystems, 2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1326d9f5-350b-46d9-95dd-773e864659f6"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun Microsystems, Sun ONE Application Server 7 Performance Tuning Guide
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce9b80e0-c3d9-41d1-be39-0c27e11c0e67"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 2004a] Java Management Extensions (JMX),
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52a64a96-5056-49d3-935e-e176f4df753b"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 2004b] Java Object Serialization Specification
, Version 1.5.0, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97506545-f179-4559-81e0-81f9f3793d7a"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 2004d] JVM Tool Interface
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f1678aa-8c66-4434-83ac-0c631bb66e89"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="993ef4bc-23c1-4c9c-ac35-876562df38f2"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4816ac40-6b25-47f1-a56b-defbccea6328"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Dean F. Sutherland and William L. Scherlis, Composable Thread Coloring
, Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Association for Computing Machinery, New York, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f759def-b6cc-4cb8-b678-35ba22e75a07"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum and Maarten Van Steen, Distributed Systems: Principles and Paradigms
, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69332b7f-a340-4284-94ed-3370d01e0f74"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Josh Bloch and William Pugh, The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e09c00a0-27fa-485a-9e0f-6334594be7f1"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Apache Software Foundation,Changelog
and Security fixes
, Tomcat documentation, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1204ce84-bc39-4fc2-957e-62dcc302fd00"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e89aa47-0dcd-484e-bb64-761a4a457663"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium, The Unicode Standard, Version 4.0.0, defined by The Unicode Standard, Version 4.0, Addison-Wesley, Reading, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="460dd5ef-8f2b-4242-857e-c3bd0b4d8032"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007] The Unicode Consortium, The Unicode Standard, Version 5.1.0, defined by The Unicode Standard, Version 5.0, Addison-Wesley, Reading, MA, 2007, as amended by Unicode 5.1.0
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f582383e-acf9-4cb0-ba81-9a99c37b1697"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium, The Unicode Standard, Version 6.0.0
, The Unicode Consortium, Mountain View, CA, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97094324-e864-4baa-b8c6-0a3d3eeb473a"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Bill Venners, Security and the Class Loader Architecture
, Java World.com, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8dcf40b-d69e-40a9-8812-ad59be282f17"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Bill Venners, Failure and Exceptions, A Conversation with James Gosling, Part II
, Artima.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="907df0bf-8675-4921-9756-d5765811aadc"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau, Extensible Markup Language (XML) 1.0
, 5th ed., W3C Recommendation, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="741d1efc-4add-40e4-a874-9d943b425c3e"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Michael S. Ware, Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Masters thesis, James Madison University, Harrisonburg, VA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a5c3d03-d43a-4782-a3ec-44d0921f3397"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Chris Weber, Exploiting Unicode-enabled Software
, CanSecWest, March 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fea97fb6-a366-4151-9daf-65b383c229ac"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] David A. Wheeler, Secure Programming for Linux and Unix HOWTO
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80bd5a91-b792-4604-b3f5-6476d237f3c0"><ac:parameter ac:name="">White03</ac:parameter></ac:structured-macro>
[White 2003] Tom White, Memoization in Java Using Dynamic Proxy Classes
, August 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63173353-4f4b-401f-91cd-9e47c5719fd9"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] John Zukowski, Creating Custom Security Permissions
, Java Developer Connection Tech Tips, May 18, 2004.