<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c9185c4-5289-434f-a52d-2936cb7167df"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7530df4-3346-4f3b-b8c8-57733ce2a096"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bbdb212-14d4-4914-ae74-166e16e7e873"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Advanced Programming for the Java 2 Platform
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0cd88431-ef7e-4cc2-8a5d-811f6dc33fb6"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, "partial order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed TODAY) Available from: http://xlinux.nist.gov/dads/HTML/partialorder.html![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36fc6b7d-f1c0-43d9-8237-0f6f0769ea8a"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, "total order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 30 March 2006. (accessed TODAY) Available from: http://xlinux.nist.gov/dads/HTML/totalorder.html![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02bbe62e-f977-40fd-9e64-22ec4bd3efec"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d032f4f1-9764-4913-a0f6-cb7a4635b7c8"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e71dbea-b291-40e4-beb8-aeba16e4f77f"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Yet More Programming Puzzlers
, by Joshua Bloch and Neal Gafter. JavaOne Conference. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f16bbb9-f6fe-4941-bf75-e390c528eb58"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Effective Java⢠Reloaded: This Time It's (not) for Real
, by Joshua Bloch. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d726b43-9aa3-4017-9f9d-817127f9c798"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8c51cdb-8a7f-4297-af50-196775dd5898"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
[Bloch 2009] Return of the Puzzlers: Schlock and Awe
, by Joshua Bloch, Google Inc. and Neal Gafter, Microsoft Corporation. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d5aadfc-9d45-4ca5-bf62-8ebdace55560"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db9027d6-b0ad-4ab8-b4d9-d1d9854a3fa0"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] The Java Tutorial, by Mary Campione and Kathy Walrath
(1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d894959-8c38-4784-b9bd-a4f0e49b6da5"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d13ad8fb-8a51-498a-ad5b-fb7e3f6bf1f4"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77250073-92c8-4ca4-943e-213aee9893c0"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4c863ce-110f-4c2b-874c-5a446b143d8c"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27cae4cb-af70-4b08-85a6-8e54bcf3bc6c"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, vol. 14 issue 10 (1981)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36a39f34-f2bf-4a19-9214-7a7d3a07f1b8"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
. Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6dcb7256-8e9c-4d12-8c13-29531f89a389"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] Common Vulnerability Exposure, MITRE Corporation. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6be2d12a-0ceb-45fa-a5dc-b32342ad458a"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Garbage Collection-Friendly Programming
by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43558a01-3c98-4189-be5c-7c6623b046f6"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9039e74d-0192-4646-9638-4b02183b7e35"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da894434-c418-42a3-ab04-2a2915b9010b"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] When Runtime.exec() won't
, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bffac4e7-3d74-4507-94e6-d518e0f02736"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21a80076-569b-48bd-89d7-2912453ffacc"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3f9a3c7-a1cc-4b4f-bb4e-c5be9bfac0aa"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Unicode Standard Annex #15, Unicode Normalization Forms
, by Mark Davis and Martin Dürst. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da38c22c-e21c-4877-96de-bfaa9a2f9abd"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Unicode Technical Report #36, Unicode Security Considerations
, by Mark Davis and Michel Suignard. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a435aca3-e63b-4cb3-8ed1-15bd6e6b1385"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (March 1966), 143-155. DOI=10.1145/365230.365252 http://doi.acm.org/10.1145/365230.365252![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b3a38f5-d6b6-4c54-818f-97c5451f95bf"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="831eacb9-fc5d-45ba-b78b-ce145daaece6"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Signed Java Applet Security: Worse than ActiveX?
, by Will Dormann. CERT Vulnerability Analysis Blog. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="621ae136-ecc1-408c-969a-32fae7da55e4"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Best Practices for Exception Handling
by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6413fde9-d53c-41a7-a898-b588d27f95a5"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. Secure Design Patterns
. CMU/SEI-2009-TR-010. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71de3f93-8167-44c5-9ca3-5fb9cbfad930"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab5f012e-f24c-41b2-ae35-498a937720af"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dffa3cc-ee9e-4d18-b7e5-43534955e853"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb578ed6-5216-4f1a-bc66-2971b0bf55ec"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04ce3761-ae3c-47f7-bae5-656c25b999e1"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6333562c-894e-487b-9911-e0990c595c80"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6186a6db-c74e-44c4-9bca-5d418a1b353f"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d547eca7-7819-4035-a521-8341f0682f9a"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b0c9ea8-5295-4fc7-94a9-1a47c4206a71"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Forman, Ira R. & Forman, Nate. Java Reflection in Action.
Greenwich, CT: Manning Publications Co., 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4d1dd42-cfd4-4a07-b951-1f97944de68c"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
Java/JSP, Fortify Software. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2518605-85f9-404c-866b-6c10e639d216"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cff72503-8b0a-40bb-9a65-254d14aceb47"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1959b7fc-daf7-408f-8799-255722d5009c"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Gafter's blog
, by Neal Gafter's. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6467b8ae-f1f9-42f8-a7ec-355790e79c79"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8dd2500-cc07-4ebe-b6a9-a80dd46eafa3"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Garfinkel, Simson & Spafford, Gene. Practical UNIX & Internet Security, 2nd Edition. Sebastopol, CA: O'Reilly Media, April 1996 (ISBN 1-56592-148-8).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4112366f-e60b-4cac-b789-c20920e228b0"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1919e104-3cd5-4eea-8fab-5fa64c622221"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Java theory and practice: Don't let the "this" reference escape during construction
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="536aee3d-5d72-47ac-a172-72751d81e3ab"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Java theory and practice: Garbage collection and performance
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5afcf39-b9f7-4925-ae0b-2d0b7ee0f0d9"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Java theory and practice: The exceptions debate: To check, or not to check?
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daeeda50-cbcf-48b4-a0f6-b31f42311ccf"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Java theory and practice: Going atomic
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c6698a8-6194-4394-940e-098b7dd04542"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6f454f0-d9f0-4eb3-a6c8-bcdad3054775"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Java theory and practice: Plugging memory leaks with weak references
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="900c5cbe-611c-485e-8eb9-eaf4ba0f5bfe"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f5de1b2-0123-475f-836e-a9b245af223b"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Java theory and practice: Good housekeeping practices
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a90e4ab-622b-4071-8233-4d0c1a880dc4"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Java theory and practice: Managing volatility, Guidelines for using volatile variables
, by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93b3960e-5906-4db0-aa92-a60019157118"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, Inc. March 1991. (1991)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="602ebf4b-fc26-4879-b32e-f23c32c426a8"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2d79b40-3346-44b2-a0f7-2ee8cdb64e92"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="265905b1-ad9b-41e6-a324-3c311f0c8a08"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3837a61f-746e-49dd-982d-556a5bedc79f"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c9126b4-6daa-4ac2-8c0c-e49fa4f68bf5"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Reflection On Inner Classes
by Jeffery Grigg. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c40a4394-d2d0-4652-9f3d-4eb4d122127d"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Java RMI
, by William Grosso. O'Reilly. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c29c9777-132d-4a89-9b7f-4019ca203eb3"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5a14cc8-9dd1-4069-a101-4c6dc5de5e48"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Immutable Objects in Java
, by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a123918e-f75e-4eb1-9e32-4a1f607d5344"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Practical Java⢠Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acf61aee-4475-4031-8c82-a2878bb14a8c"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Java Developer Connection Tech Tips
, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44445616-bf4c-4bc2-a997-2f88f5493a1f"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Java Developer Connection Tech Tips
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea30950c-b71a-47fa-be82-c3547c3d47fc"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5cbed85-3570-427c-a947-9908a74c6e89"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Java I/O, by Elliotte Rusty Harold. O'Reilley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9edd19a3-45f7-4053-bab2-2d6036a9eb31"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8316e39f-29d6-4eb0-9b42-f0db4b90a638"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f27afd3-18c6-4668-a6f7-60799aa67034"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] Heffley, J. & Meunier, P. âCan Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?â Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04) - Track 9 - Volume 9. Island of Hawaii, January 2004. IEEE Computer Society, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b84a4f6a-4e3b-4aca-84b8-683e0c98a1a2"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Null Object, Something for Nothing
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c47b0d12-5c95-4cef-aca8-f1a747ac923d"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Java⢠NIO, by Ron Hitchens. O'Reilly. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71cb3ba0-986e-4091-bfbc-bdea69b98a0a"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Advanced Java⢠Globalization
, by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93c2e4c6-db9e-4696-8046-4524a885a2c6"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8903624e-4efa-48ff-8f78-686aeb4f5028"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Howard, Michael, & LeBlanc, David C. Writing Secure Code, 2nd ed. Redmond, WA:
. Microsoft Press, December 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="161a0d73-b13b-4c08-b0c5-d7f7144073d5"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="388b898e-354b-464d-af5e-a9d93f1c8e0b"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9e0a556-38c7-4470-8cbf-41fadb75b52f"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE. Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32d10eb2-07a5-449a-a796-998e61cebd1a"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76921814-a22a-44c5-97c8-f8482a8ea65c"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. J2SE Documentation version 1.3
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcb3d626-6480-41fe-add0-ba71cc3ea661"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corp. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="764e55bf-5a6f-4794-9609-f3aca8711799"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2922a902-1dcd-44cd-b413-b03c250a932c"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java - the Java application launcher
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97c2f6f4-b0c0-4a82-ad6e-1b5170c41524"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d02af993-9c4d-4c2f-bbb3-481d6dbf203e"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html
], Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a6ae589-fee8-444a-821e-8373ba54f562"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e0635bc-bfa2-4b1a-86ee-7ba33e77260c"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa503e47-16d4-49ed-bdd6-6f9ee0be4b7f"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, Inc., 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19d99772-808d-4fc7-9239-e91e69f9fab8"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0588cd4-759b-4eca-b0a4-455cd61adca4"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef40bc46-a35d-471c-9365-8c4e4a782d0c"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eed1097c-ec33-4831-9e1d-043bcfde2c02"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="835b33a7-e250-496f-97be-1c7c7add1b10"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7c350cf-b9eb-495b-be3e-714afe48cb98"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11840cf0-ae15-473c-b6b3-e5e4980e87f9"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cd7f6d8-64b4-432a-9ce5-f517ce06304b"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="269f2d01-91c9-410a-985c-a13bb43633a2"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3307af09-4d59-4a95-be5f-9d382678d4d5"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4fdc441-339a-4f51-a4cd-1e39e7a7fa5a"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] The Ultimate Java Puzzler
by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b771a4a8-1eb0-4832-8f04-7f00e58a36ed"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d587e867-91f5-4e70-9a50-fe500d246062"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cce17439-10a0-4f19-b7af-e3e63bb42520"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Java⢠Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)
[Lai 2008] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0db7caf-a4b6-402e-8539-a486c7344861"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
, Angelica Langer. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="781f50c2-bca2-4efb-9041-73dd1ba4b4f4"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b484a90-d474-4bb0-bddd-3581a636baa0"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Correct and Efficient Synchronization of Java⢠Technology based Threads
, by Doug Lea and William Pugh. JavaOne Conference. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6caa8e95-8827-4cc5-8e54-df4d4e6ceb42"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] The JSR-133 Cookbook for Compiler Writers
, by Doug Lea. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2636037c-c1b6-406f-82f4-2e1e3fe037f7"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Robust and Scalable Concurrent Programming: Lessons from the Trenches
, by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bf937e0-cc6f-4d3a-bbfa-a41ad681f56f"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90a7ea0a-687f-417a-8027-219790a4ebba"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Dynamic Class Loading in the Java⢠Virtual Machine
, by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff10a377-6184-4c70-94c2-a5410b626034"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Using prototypical objects to implement shared behavior in object-oriented systems
. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79ffcc69-71c2-4e45-9db6-6185c33f8ae0"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Security Issues in Garbage Collection
, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a86ef42-b2cf-4e66-94af-fa894bf77186"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="384e1766-88df-4d10-b6d9-c98f5e50f6d2"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group. Java and Java Virtual Machine Security. Poland: Last Stage of Delirium Research Group,
2002. http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47dbe626-5c75-4256-9f39-7c8e25c7d09e"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71c012fa-6965-42fa-8917-9d433bf1c4d4"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dbec1d0-046c-4e13-906c-3406c157705f"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Compressing and Decompressing Data Using Java APIs
, by Qusay H. Mahmoud. Oracle. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab282523-1c0b-452e-98cd-2c0f33343a5a"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21a640fa-b7a6-480d-8c8a-0d681f23fd96"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] JSR 133 (Java Memory Model) FAQ
, by Jeremy Manson and Brian Goetz. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24871a4a-2d4e-4fae-8064-818c2e193302"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] The Java⢠Memory Model: the building block of concurrency
, by Jeremy Manson and William Pugh, JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c24c7e0-d805-47eb-bf6a-6ce73aaf369e"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Granularity
, by Robert C. Martin. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcb4f03d-3673-44df-813c-c831e7d71f26"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bb3e171-d5aa-417e-a128-ee89d7f28d27"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2313c352-1a5d-45c3-b71a-dd00f7fae283"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Twelve rules for developing more secure Java code
, Gary McGraw and Edward W. Felten, JavaWorld.com. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65e341ea-2053-49a0-9369-45c9726238f9"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010A] A. Mettler, D. Wagner, and T. Close. Joe-E: A security-oriented subset of Java. In 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b085b04f-d4ac-4d9a-aef4-b81bc4284cb3"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010B] Adrian Mettler and David Wagner. 2010. Class properties for security review in an object-capability subset of Java: (short paper). In Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, New York, NY, USA, , Article 7 , 7 pages. DOI=10.1145/1814217.1814224 http://doi.acm.org/10.1145/1814217.1814224![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="171cfa57-7faf-4dea-b861-3d994f7058ae"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Java⢠Platform Concurrency Gotchas
, by Alex Miller, Terracotta. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b12ae15b-85bd-4c3f-8ea4-9e30c574bde9"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] Common Weakness Enumeration
, MITRE Corporation. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38ae8a34-b69e-460c-8a5c-40080c40b22c"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8358bd1f-4577-4c33-a448-24591a94f266"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Ruining Security with java.util.Random
Version 1.0, by Jan P. Monsch. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c667314b-4534-429f-8e20-7432096ba50d"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Using SQL Escape Sequences
, Microsoft Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6b08587-c54b-42c0-9727-901a1b80d23a"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60faa152-0ede-4fca-bd5e-b9c290d133e8"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75754f0c-1667-4403-b28f-d002e8468862"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b474d5d-edee-4042-b3f3-62a290f9f16d"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Java⢠Generics and Collections: Tools for Productivity
, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db3d8afb-d819-43dc-acdd-cae780193ea6"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] What Are Race Conditions? Some Issues and Formalization
, by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin — Madison. (1992)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c9ceccf-0311-4353-a10d-74b21131571b"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64f57ef4-5652-4b50-82b3-f3a168eb29e5"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c782fba2-b449-464b-87c9-fbf273a83597"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Decompiling Java, by Godfrey Nolan, Apress
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6315576-eb56-40c8-9289-927085d9ee04"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f54b2cec-7414-44fc-b564-f3d44efa0c97"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The Open Group Base Specifications Issue 6
. The IEEE and The Open Group. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f626f7b-e8a9-4cbf-bcb5-6041ac0ef4e6"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning
, Oracle Corporation. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7edc99de-8032-4d3d-8191-48f4b229b4f7"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] A Guide to Building Secure Web Applications and Web Services
. The Open Web Application Security Project. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4eeb9799-8ac2-4643-969c-de7621015009"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP TOP 10 FOR JAVA EE
. The Open Web Application Security Project. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46f71ced-66d4-4cfe-94b9-763adfd07e19"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71242800-cb76-46cc-b656-d76131903898"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d90256eb-7807-4e15-9b47-3bcf3676e7c1"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Beware the dangers of generic Exceptions
, by Paul Philion, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b28e43d-0134-4e8a-bcd7-d560e3aa996d"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bf03511-9de2-4287-84f4-c0a636d7f9e3"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ce476dd-a9de-4608-aa43-22df387cc458"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0debb60-c94c-4b77-8b4f-f98e42ba5327"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] The Java Memory Model (discussions reference)
by William Pugh, Univ. of Maryland. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d34d60c4-67dc-4bde-90c3-0521dec1bdf0"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Defective Java Code: Turning WTF Code into a Learning Experience
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ada6370f-5499-429b-85df-031f7d4b31dd"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Defective Java Code: Mistakes That Matter
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04e3ecf4-7b90-4aa2-9918-874f9710ed35"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, Reasoning. 14 Nov 2003. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="672b7dbe-d172-42dd-9163-6d2e839c2451"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a148a1a-74c4-4758-9773-ba8e22087cdb"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] The Elements of Java Style
, by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcafc3a9-c6b9-4d2c-afad-a69266f28a35"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Fallacies of Distributed Computing Explained
, by Arnon Rotem-Gal-Oz. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="338ec8ff-b8fe-4be2-9f6a-18460390b3bf"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Breaking Java exception-handling rules is easy
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b8b700b-6128-4302-922f-b724daa01852"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Into the mist of serialization myths
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a85de31-b124-4559-a6d1-e3c32733b54a"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be5227a7-9756-40d9-b778-86e5f3de22bf"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." Proceedings of the IEEE 63, 9 (September 1975): 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c7f1812-e227-4c60-bdd0-c8e0b0a3dc6d"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0
, Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bae3afc-cfab-492c-8a64-15f75631ee90"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c8b608b-8e3d-4ecc-9c16-b8a0b64cdc7e"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffd4af63-9d5b-400b-9da7-4791850f481f"><ac:parameter ac:name="">Schoenefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Schönefeld, Marc. âSecurity Aspects in Java Bytecode Engineering.â Blackhat Briefings 2002, Las Vegas, August 2002.
http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-schonefeld-java.ppt
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3b14dd7-eba6-4d8c-abef-6849a71fb474"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Schönefeld, Marc. Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4535aede-3cb4-48c0-abc0-98a33c6970b5"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Avoiding Checked Exceptions
, by Don Schwarz, ONJava (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47ba72d7-22fe-4984-b4d3-7075818ca486"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Java Tip 134: When catching exceptions, don't cast your net too wide
, by Dave Schweisguth. Javaworld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd6093e2-31b4-460b-84ff-9ad5d2a3c714"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] SUN Developer Network
, Sun Microsystems, Inc. (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27ab2fde-7dce-4ebb-b4f8-e1e0886194c0"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++
. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="edc16920-b136-4409-8498-fe01cb32ce62"><ac:parameter ac:name="">Seacord 2008</ac:parameter></ac:structured-macro>
[Seacord 2008] Seacord, Robert C. The CERT C Secure Coding Standard. Boston, MA: Addison-Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0263a3c3-cf61-41f7-9e40-737d9b84ee0e"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fcf3ab3-0fe2-4975-b267-c1daeb8fa527"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia Advisories
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd5b1961-3695-49f3-8d86-d29e9d3c374b"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c59bcb6a-71a7-440e-831e-878985eea44c"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a8fa1a0-bc39-4e55-97eb-bfdfa9239edc"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Avoid the dangers of XPath injection
, by Robi Sen, IBM developerWorks. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a624b7f1-b523-4873-9aba-3430aa4eda32"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb27c9c9-3e78-4499-b407-0d79a892792a"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, G. L. "Arithmetic shifting considered harmful
." SIGPLAN Not. 12, 11 (November 1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50d88249-5e06-43f3-b49d-92c84b8bdcb8"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Java Developer Connection Tech Tips "Using the Varargs Language Feature"
, Daniel H. Steinberg, January 4, 2005. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="238e11e3-6651-4599-b271-4c80b543c8b1"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Secure Coding Antipatterns: Avoiding Vulnerabilities
, by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa80fe33-43bd-44c5-b225-bb532f9f105a"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] XXE (Xml eXternal Entity) attack
, by Gregory Steuck (www.securityfocus.com). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa13d540-41ba-42ae-8f5f-bcc7ee3e6473"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 02] Sun Microsystems, Inc. Reflection. http://java.sun.com/j2se/1.5.0/docs/guide/reflection/index.html
(2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="887fda51-3b22-4a92-9a9a-2ab12e92e3fb"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d2eba6b-1bf3-409d-b697-856a989eb97e"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide
, Sun Microsystems, Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21bd3bae-157f-43fb-a533-860c7183a971"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 04a] Sun Microsystems, Inc. Java Management Extensions (JMX). http://java.sun.com/j2se/1.5.0/docs/guide/jmx/index.html
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ca2b732-0ef7-4d2c-98c8-11a6be6588a7"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 04b] Sun Microsystems, Inc. Java Object Serialization Specification, Version 1.5.0.
http://java.sun.com/j2se/1.5.0/docs/guide/serialization/spec/serialTOC.html
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13e97e7f-daf1-43eb-a43c-77a170595a22"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 04d] Sun Microsystems, Inc. JVM Tool Interface. http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/jvmti.html
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="597fc0a7-5008-4cb2-993a-a50b116447b0"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab8bad72-3454-430f-83f0-e8f784c5dd64"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8181785c-767a-47aa-8ecf-61dc1f75fa49"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Composable thread coloring
, by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abc3c827-7f41-495a-9b0d-ae6e927236ba"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum, Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2/E
. March, 2003. ISBN-10: 0132392275.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93de8390-2e8b-4ef0-a1ed-bd32bb88ebd3"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ff469b9-1e7a-432b-9886-a652d639830e"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat documentation, Changelog
and Security fixes
, the Apache Software Foundation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ef144ab-0d3f-4dc2-ac8a-a41bf339cc05"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2482abc-46a1-45cb-8b40-ad3b183fcef4"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium. The Unicode Standard, Version 4.0.0, defined by: The Unicode Standard, Version 4.0 (Boston, MA, Addison-Wesley, 2003. ISBN 0-321-18578-1)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66f60ce9-1775-4a6a-af8e-21f84f51aaf9"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007]
The Unicode Consortium. The Unicode Standard, Version 5.1.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007. ISBN 0-321-48091-0), as amended by Unicode 5.1.0 (http://www.unicode.org/versions/Unicode5.1.0/
).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35ac6454-c470-4506-af61-0264d36cd62f"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium. The Unicode Standard, Version 6.0.0, (Mountain View, CA: The Unicode Consortium, 2011. ISBN 978-1-936213-01-6)http://www.unicode.org/versions/Unicode6.0.0/![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f22d87db-6d93-4f50-8e4d-e9a9918feb2d"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Security and the class loader architecture
Java World.com, by Bill Venners. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93deea72-2d8d-4413-9d2f-1dbb4113ef99"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Failure and Exceptions, A Conversation with James Gosling, Part II
, by Bill Venners. Artima.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73479933-b0ac-4e20-a21a-ea8887845a41"><ac:parameter ac:name="">VU439395</ac:parameter></ac:structured-macro>
[VU#439395] Lipson, Howard. Vulnerability Note VU#439395
, Apache web server performs case sensitive filtering on Mac OS X HFS+ case insensitive filesystem, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7b61fbc-3b73-4142-b13b-d82798e8d426"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Extensible Markup Language (XML) 1.0 (Fifth Edition)
, W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7b5f60d-cb26-44e0-883a-47bd6f530280"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Michael S. Ware. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="feb073bb-f310-4410-9026-5b6173638a05"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Exploiting Unicode-enabled Software
, by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54272b1c-fc2f-4857-af2d-aa2d59e869f9"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Secure Programming for Linux and Unix HOWTO
, David A. Wheeler. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80cbcf88-607f-4f5e-8be5-8bcc7993d7ea"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Java Developer Connection Tech Tips "Creating Custom Security Permissions"
, John Zukowski, May 18, 2004. (2004)