<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa7e18b2-c3ff-4a92-99f5-7b4f5d07dbdf"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d90ebfda-4397-447a-a225-b5481c1e354d"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79d9c44c-b71d-45e4-bee3-8f2c6367c163"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform
, Addison-Wesley Longman, Boston, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f326d5d5-a36f-443e-b3a3-7c45961cfbe0"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="990a755c-627e-403c-8276-0addac7eb94b"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f40f0399-030b-41a6-8e1f-d210329fd9aa"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b18f902-2c5d-4d0a-9812-c8cb39014df3"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a55e5c7-10c3-4ad4-9322-f128ebfc5dde"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers
, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cde00cea-a015-4398-9771-874df404a8dc"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java⢠Reloaded: This Time It's (Not) for Real
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3766d766-1631-4942-97af-190fb3057a75"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="543b109a-aed0-4b24-9a43-12d3df03d51d"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c24e9b59-b28c-49cf-b295-b7e389da0b56"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java⢠Technology-Based Memory Model, JavaOne Conference, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be016c25-4f57-4c8e-a380-2af22edf4d97"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet
, Addison-Wesley, Reading, MA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0383cf52-7c5d-429e-82df-be6b10754221"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8edfa3eb-73d1-4bb6-a3e0-712780020896"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bdd5b0a-0d93-4bd3-aa91-a4da3bc9d3ec"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0369ec86-f2d2-4c69-bee4-41a04810bc39"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e7b8e28-3c2e-4a7a-88ca-2626d209f7b3"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, Volume 14, Issue 10, 1981.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21570148-055d-430c-bfad-5133f39646e5"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
, Sun Microsystems, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="431f4d7e-23c8-4075-9f17-535b68f1220f"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc1c7de1-619a-438b-be29-e376714cd180"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming
, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fff6b7e2-4349-45b4-a586-a2786a84656a"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java⢠2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f41a090f-0c5d-416a-b736-67b3b056ad26"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06c60542-2c2d-4c68-a658-e7fca763a997"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't
, JavaWorld.com, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="91ca02d4-b710-4046-8262-c6fc845caee7"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c39d4fb0-4d31-4405-90e3-56ce804a6802"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b8f9958-5917-452d-b6f1-99d48fb2dc7c"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24243c4c-73a9-4e57-bcc0-985f71758717"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cbd0e81-a5a6-482d-9a17-92ab323e9aa0"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations
, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be15ecd9-6ea1-4dac-b184-02a56a45741a"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In
, U.S. Department of Homeland Security, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2e4ca47-bbcb-41d6-9ce2-6715731a52e3"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?
, CERT Vulnerability Analysis Blog, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e63ab7a-0683-4dd4-8b6f-929a9516717f"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling
, ONJava.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="374b0255-e187-45b6-afc4-a5c5f1e8cb7a"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns
, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f520213a-9a75-4acd-8bdb-c017ea3ef2df"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="314ee9c3-cf97-474a-8a15-9282ad176fbd"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b03c02e-3a5b-469f-88b7-0d9473475037"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture
, Sun Microsystems, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d946ebcc-7f23-4bc4-8f42-4969786daaf0"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="119b8a38-0692-471b-ba4e-f813cb7c47eb"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48199869-c5af-4d11-86d6-91b63b5af66e"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33b5e4a5-7092-40ba-908c-d8f357bc7e36"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f547d70-fbab-4173-9e13-347e3a47acf9"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="276d423e-390b-4e50-8d50-8a09c70cb9fc"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8973aa5c-08c2-481c-a017-497b27e32138"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="902b2b5d-882b-4967-b420-66966f5cb311"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
, Java/JSP, Fortify Software, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f5fffd0-4b32-4ac1-8d89-c6c331eb75b8"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?
, Sun Developer Network, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b193e46-b688-4fc3-89fd-683fcc5250f7"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94b10f60-08a6-4465-9845-b96464512c36"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76f22c31-9d3f-403f-b7c7-1e00bf8a192c"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb77498c-9178-4f88-88ad-f37b048be712"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="355ab26c-0a49-4dd9-b950-88c20d77af37"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e02ffd6-928c-4653-acf3-b62bcaf62d8b"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction
, IBM developerWorks (Java technology), 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72e818fe-1f91-42de-a3c7-9cd1b363dbff"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6662cf9-a424-4354-a236-adc4a705a154"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93b199e4-06f3-45e1-81ba-9285832f3379"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic
, IBM developerWorks (Java technology), 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="460f19a8-45ef-4b99-afa7-c240fade1983"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c9a7466-d7f1-493b-9a15-886e09a98acc"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References
, IBM developerWorks (Java technology), 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da7bea3c-012e-4b23-90a4-2c04dc973b7e"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db6d43b6-39be-4e32-a4e2-03ab29beadbe"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94f66ced-7aee-4600-b4fa-75e493454649"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables
, IBM developerWorks (Java technology), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7784d9c-c573-4a7b-92d9-9b79882d2429"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic
, Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6e81d6b-345e-4776-a6d3-7194fee91b52"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ca34a25-8853-4abd-a9c1-cadbfcfda97d"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="582eff9b-ad0f-4a0b-855c-7647b0b2feb7"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API
, Sun Developer Network (SDN), 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f8ca70e-7bcb-4d1d-b7be-12792675e0b2"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f68aee2c-ed1e-4c24-81e1-2e71bf33d411"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc305dd6-c959-4abb-8baa-ce01605cf6d2"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI
, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31c90eae-5e13-4608-a891-f47895a08540"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e7222e0-a8ae-43af-ac5e-15ff453d2cc7"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6d8d528-e93b-4602-a79a-6b7c23a34464"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java⢠Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c514f64-5206-45b0-ae5e-6acbe1be2478"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips
, March 28, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cb1a78d-17d1-4081-9e33-42c3c33aaba8"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips
, January 30, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69d83a60-bc28-4835-8c8a-cf2e9d9e6093"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42d07941-eb1b-4c68-8836-0d2da0bbe37a"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f64f157-e619-45a6-8f33-b7043e8adbf6"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfd6b162-1b91-4ee6-9043-50c53e872697"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
, Sun Microsystems, Make it Fly 2008, London. 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16f3d59a-eb9d-4dd3-beae-59c43e44fa2d"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cf9d4c1-0d86-4e70-af8d-cfd15465e3e8"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5453ff71-da86-4d5b-aeaa-c65960e23510"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java⢠NIO_, O'Reilly, Sebastopol, CA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f514c90-660e-44ad-9539-3d9e74c7e232"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java⢠Globalization
,JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a81c28d4-20e8-4574-8525-00bf6a2f9353"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1ca991f-4f4b-4f0c-be1d-c2131a937042"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code
, 2nd ed., Microsoft Press, Redmond, WA, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d879b3bf-953c-4e68-9146-b0ce17654784"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8adab20a-05ae-45e9-959a-264193f7c7f5"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6d65189-292c-4f26-a939-56d834308c9e"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ee9d243-42f0-44d6-a6c2-2715c9b85b89"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information Technology — Programming Languages — Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d15d4566-9034-4cfa-bdc7-7654e2f9d56b"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b53f57b-ce3d-44a2-85a1-f2312c68db82"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java⢠SE 7 Documentation, J2SE Documentation version 1.7
, Oracle Corporation, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16edca91-def4-4881-bb42-3edbbe766438"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9233287-bf58-49e8-b91d-730b6c5e8d56"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b0ccb8f-1dbe-48a4-95c6-a7275240ba4b"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5838c0eb-5e87-40d4-b9f8-f0ed9eb384d4"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfe43537-0c86-4723-8ce9-2c61b1ba3ef8"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7539a45-c474-4b4f-a2a1-0e456910b97a"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdc4fd07-37b8-4ba2-8bf5-9c70b37f87a7"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, December 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ac43f39-e75c-40cb-a09d-6fe094b10063"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification
, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dab3448-32ee-4f64-924b-5a58ffe0d6b7"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcd81781-c578-45b2-8012-03bdcd4732e2"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03636014-b15b-4b27-8d5b-a4550ea451f6"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db7920c9-483f-4927-95c8-b78b888c3383"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.258-263, May 21-24, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eee302a0-7233-47a2-8c18-b8f40d16feff"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03630dce-c11e-4377-b19d-8ab0df934767"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Ken Arnold, James Gosling, and David Holmes, _The Java⢠Programming Language_, 4th ed., Addison-Wesley Professional, Boston, MA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3ef176e-7bc1-4521-ac61-b68237fd9707"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java⢠Memory Model and Thread Specification
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48416315-95c0-4b3e-9e7c-a4fd7895534d"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b519b22e-2e8f-4153-be43-5ddf9cdc424f"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2a2d6e5-8d3c-4ce6-8014-2728fedda635"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Jevgeni Kabanov, The Ultimate Java Puzzler
, February 16th, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ecc4c9cd-c06f-4e85-be8b-adb08b035125"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Heinz M. Kabutz, The Java Specialists' Newsletter, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efb40568-4ef0-4cce-8314-852ef2c04c0c"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Alex Kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92feeff6-d1e8-4a1c-8fc5-cb800ff1715d"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Kirk Knoernschild, _Java⢠Design: Objects, UML, and Process_, Addison-Wesley Professional, Boston, MA, 2001.
[Lai 2008] Charlie Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f93979c-decb-4bff-ac4a-0b42d4b7012a"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Angelica Langer, Practicalities – Programming with Java Generics
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed199d35-c786-4b2a-8772-89971e435f84"><ac:parameter ac:name="">Laplante 05</ac:parameter></ac:structured-macro>
[Laplante 2005] Phillip A. Laplante, Colin J. Neill, Antipatterns: Identification, Refactoring, and Management
, Auerbach Publications, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05e75ec4-b2d5-4bca-828c-d149dde5506b"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000a] Doug Lea, Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, MA, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="228994d1-ce1c-45c7-88f9-6aef46d1e7ed"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Doug Lea and William Pugh, Correct and Efficient Synchronization of Java⢠Technology based Threads
, JavaOne Conference, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="938cf23b-ec51-4bc9-b26f-2940bdf960bd"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Doug Lea, The JSR-133 Cookbook for Compiler Writers
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58d66f91-8e4c-4bee-ba3c-8e6dbc7273e3"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Sangjin Lee, Mahesh Somani, and Debashis Saha, Robust and Scalable Concurrent Programming: Lessons from the Trenches
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c10244f1-5449-4f18-b19c-40ae9f121c1e"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Sheng Liang, _The Java⢠Native Interface, Programmer's Guide and Specification_, Addison-Wesley Professional, Reading, MA, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bac48dfd-f6c8-4ed5-876a-fa64f44738c8"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Sheng Liang and Gilad Bracha, Dynamic Class Loading in the Java⢠Virtual Machine
, Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53a028ec-ce67-4d1d-a690-2d1f0651ca00"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Henry Lieberman, Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
, Proceedings on Object-Oriented Programming, Systems, Languages, and Applications, pp. 214-223 (ISSN 0362-1340), Massachusetts Institute of Technology, 1986.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f016aeda-f221-4c3a-bbc2-8c44656292ed"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Chia-Tien Dan Lo, Witawas Srisa-an, and J. Morris Chang, Security Issues in Garbage Collection
, STSC Crosstalk, October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09be9625-0f68-4020-8da7-89679229d013"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Fred Long, Software Vulnerabilities in Java
, CMU/SEI-2005-TN-044, Software Engineering Institute, Carnegie Mellon University, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0f08451-9f18-4937-892b-7b54e6ec7866"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group, Java and Java Virtual Machine Security
. Poland: Last Stage of Delirium Research Group, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2aa1faec-cd3c-43a0-a844-641965398101"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Douglas Low, Protecting Java Code via Obfuscation
, Crossroads Volume 4, Issue 3, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c510800a-9cbd-406a-a934-1b8bb29fd77f"><ac:parameter ac:name="">MacGregor 98</ac:parameter></ac:structured-macro>
[MacGregor 1998] Robert MacGregor, Dave Durbin, John Owlett, and Andrew Yeomans, Java Network Security, Prentice Hall PTR, Upper Saddle River, NJ, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2377290e-240d-443c-9e07-63cd5a502e58"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Qusay H. Mahmoud, Compressing and Decompressing Data Using Java APIs
, Oracle, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3957802-b0c1-44cb-8d61-844ad031d0bc"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Ronald Mak, Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93428287-00f4-4e74-9476-b275cd2c6d92"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Jeremy Manson and Brian Goetz, JSR 133 (Java Memory Model) FAQ
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d14f6c5d-fe11-4e12-ae6f-abf5f82d7ce3"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Jeremy Manson and William Pugh, The Java⢠Memory Model: the building block of concurrency
, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b62ce269-859c-4d7a-a274-dea7f7bf0643"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Robert C. Martin, Granularity
, 1996.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e980cd0-fc07-401f-aca7-3f8f75497856"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Glen McCluskey, Java Developer Connection Tech Tips, April 10, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5c25a84-dc8f-41ed-895a-0ec6ea9230d9"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Gary McGraw and Edward W. Felten, Securing Java, Getting Down to Business with Mobile Code, Wiley, New York, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71198b6b-b000-4e3e-89d6-8a1583f4d5fb"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Gary McGraw and Edward W. Felten, Twelve rules for developing more secure Java code
, JavaWorld.com, 1998.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="057f8780-a89e-436a-aa4f-a845eeab05ea"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6d0a8df-68a6-4911-91de-1bfd6d2ce41d"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java
, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI=10.1145/1814217.1814224, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b819cce-62a5-4163-b55d-1c45812414cb"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Alex Miller, Java⢠Platform Concurrency Gotchas
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="244c1bee-7df7-41fd-8f56-c152d9133bff"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] MITRE Corporation, Common Weakness Enumeration
, 2011. Available at http://cwe.mitre.org/
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="242117b3-1d0f-425b-ab97-03fb2594bd1d"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="607d9af5-d232-458a-855e-87acabd32941"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Jan P. Monsch, Ruining Security with java.util.Random
Version 1.0, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb8f836a-0514-4420-8c26-529d6b2fc973"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft Corporation, Using SQL Escape Sequences
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ffdc01a-e3aa-4e83-a94b-ee7ace16a1f2"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] John W. Muchow, MIDlet Packaging with J2ME
,ONJava.com, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b68c215-71b8-46f4-9dae-9729c1de3e6a"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Dr. Andreas Müller and Geoffrey Simmons, Exception Handling: Common Problems and Best Practice with Java 1.4
, Sun Microsystems GmbH, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="beb02dea-ad05-4a86-b970-0e6d465aeca9"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006a] Maurice Naftalin and Philip Wadler, Java Generics and Collections, O'Reilly, Sebastopol, CA, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85778266-1380-4010-8c38-950a52dda6de"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Maurice Naftalin and Philip Wadler, Java⢠Generics and Collections: Tools for Productivity
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6851e32-459e-4e9e-a011-4931c6ecda1a"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Robert H. B. Netzer and Barton P. Miller, What Are Race Conditions? Some Issues and Formalization
, University of Wisconsin, Madison, 1992.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b8b4772-c2d3-49d3-9d10-f505c9cc2246"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Ted Neward, Effective Enterprise Java, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1153d467-4a1d-43d7-bc42-2c4cd349dbdd"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Jeff Nisewanger, Avoiding Antipatterns
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="768ea106-27ad-43f4-ae62-ac534ee72a63"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Godfrey Nolan, Decompiling Java, Apress, Berkley, CA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b77fcf0a-a867-45dc-81c0-c65de2845dd2"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Scott Oaks, Java Security, O'Reilly, Sebastopol, CA, 2001.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2db84dd7-fc56-40f9-9d44-8e6eca8d588c"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The IEEE and The Open Group, The Open Group Base Specifications Issue 6
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04544379-7599-4172-aaea-ad37839f5586"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Oracle Corporation, Java SE 6 HotSpot⢠Virtual Machine Garbage Collection Tuning
, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35baa244-629a-4ae3-85cb-1df9644ed7f1"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] The Open Web Application Security Project, A Guide to Building Secure Web Applications and Web Services
, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d659bd5-5d40-4734-9dc7-0e1124d8dfe9"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] The Open Web Application Security Project, OWASP Top 10 for Java EE
, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32b7cdf3-0eab-4960-a398-8454c78c4961"><ac:parameter ac:name="">OWASP 11</ac:parameter></ac:structured-macro>
[OWASP 2011] Open Web Application Security Project (OWASP)
, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="743d2941-512a-4995-82ca-1002b7f2f0f6"><ac:parameter ac:name="">PCI 10</ac:parameter></ac:structured-macro>
[PCI 2010] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard
, Version 2.0, October, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac7c2e2f-a46c-465c-b3e5-b08c297302cc"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fe30153-7746-47e4-8a73-fee6a1823d72"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Paul Philion, Beware the dangers of generic Exceptions
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3271bf5-ae32-47bc-bffc-04d9f202b35c"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Addison P. Phillips, Are We Counting Bytes Yet?
, 27th Internationalization and Unicode Conference, webMethods, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7a3dc7c-0ae6-4416-a037-1de87ff665b4"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston, MA, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec07c5d5-5103-48ae-9c9f-16d4788d6f17"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Sun Microsystems, Default Policy Implementation and Policy File Syntax
, Document revision 1.6, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5648a77-7c86-42a4-adf2-737cc9a32b19"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] William Pugh, The Java Memory Model (discussions reference)
, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63812ea0-02a7-4127-b38b-43ef720131a5"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] William Pugh, Defective Java Code: Turning WTF Code into a Learning Experience
, JavaOne Conference, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50064415-4690-478f-add0-37eae19940dc"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] William Pugh, Defective Java Code: Mistakes That Matter
, JavaOne Conference, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc2e7d57-589e-4591-bc04-c6628dddc70d"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, November 14, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4a1e309-d381-4709-a499-f384aa38d9bd"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Sun Microsystems, Reflection
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37c61d92-81ae-4390-9c98-80637c1b4add"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson, The Elements of Java Style
, Cambridge University Press, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="625b3256-ae13-4c26-8bde-3f79a01c43f7"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Arnon Rotem-Gal-Oz, Fallacies of Distributed Computing Explained
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="298e321e-681e-44cf-9a52-10804920f4fe"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003a] Vladimir Roubtsov, Breaking Java Exception-Handling Rules is Easy
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c90150a0-64d0-4c1d-84d8-a746caa023d6"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Vladimir Roubtsov, Into the Mist of Serialization Myths
, JavaWorld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56464318-63bf-46ca-a2cc-e1042299fad9"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0489a63a-0282-4322-adaa-6bc49b338cb2"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, Volume 63, Issue 9, 1975, 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52b13e74-5928-4961-97c1-fe3df5035143"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Sun Microsystems, Secure Coding Guidelines for the Java Programming Language, version 3.0
, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef18b664-d7cf-40ad-9705-42deb4b1531d"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt, Herb Schildt's Java Programming Cookbook, McGraw-Hill, New York, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bcf884a-37b9-445e-b9ea-73005f4ad247"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Bruce Schneier, Secrets and Lies---Digital Security in a Networked World, Wiley, New York, 2000.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77a8f524-ce74-4d08-942f-05fa6f5537cb"><ac:parameter ac:name="">Schönefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Marc Schönefeld, Security Aspects in Java Bytecode Engineering
, Blackhat Briefings 2002, Las Vegas, August 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6775ef02-0263-481a-829b-5c8ce9467360"><ac:parameter ac:name="">Schönefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Marc Schönefeld, Java Vulnerabilities in Opera 7.54, BUGTRAQ Mailing List (bugtraq@securityfocus.com), November 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25360ec9-99d1-4809-b996-450326a28132"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Don Schwarz, Avoiding Checked Exceptions
, ONJava 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c7d9304-37e6-46ee-b21e-e67bc220e7a1"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Dave Schweisguth, Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide
, Javaworld.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09ff576c-7445-48c6-9875-2a0706dd7eb6"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Microsystems,SUN Developer Network
, 1994-2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10b06e38-dbbd-4744-b6ad-2e13c85300b5"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++
, Addison-Wesley Professional, Boston, MA, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ea94327-2bb4-4b31-8276-4b056fa6f2da"><ac:parameter ac:name="">Seacord 08</ac:parameter></ac:structured-macro>
[Seacord 2008] Robert C. Seacord, The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston, MA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7216d32-fa4a-4d34-838f-5a95210f3678"><ac:parameter ac:name="">Seacord 10</ac:parameter></ac:structured-macro>
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12f9355d-89e7-47f9-a786-8deea327d85b"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Sun Microsystems, Java 2 Platform Security Architecture
, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a2a0bb2-bfd6-4ee2-bbb4-13f4ac3df692"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia ApS, Secunia Advisories
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4548447c-5fd1-4e34-86bb-70d63afc199b"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ab0abe0-6d17-4428-a932-40cf7804572d"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Sun Microsystems, Java Security Architecture
, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9516bd1d-cfb6-49ed-92ed-4271695e7a7b"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Robi Sen, Avoid the Dangers of XPath Injection
, IBM developerWorks, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92dad932-90fc-462f-aa3e-c68af1d4a77c"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Christopher Steel, Ramesh Nagappan, and Ray Lai, _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_, Prentice Hall PTR, Upper Saddle River, NJ, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18cd9179-198a-49b5-8213-b769e20ed73d"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] G.L. Steele, Arithmetic Shifting Considered Harmful
, ACM SIGPLAN Notices, Volume 12, Issue 11 (1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e094dc3-3316-4632-97bc-ccb51f60bb1d"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Daniel H. Steinberg, Java Developer Connection Tech Tips Using the Varargs Language Feature
, January 4, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17ed3963-789c-40a7-86db-23e1c001bbbe"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Andreas Sterbenz and Charlie Lai, Secure Coding Antipatterns: Avoiding Vulnerabilities
, Sun Microsystems, JavaOne Conference, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a412e958-b86c-4347-890a-44a669480b2b"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Gregory Steuck, XXE (Xml eXternal Entity) Attack
, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e091d41e-ddd0-44c9-8a28-33de2ca2ec43"><ac:parameter ac:name="">Sun 99</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f34bccf-f981-49d2-b199-0dd5f0ed4211"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 2002] Reflection
, Sun Microsystems, 2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5229cda-f016-466f-b1eb-87c5587fcd35"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun Microsystems, Sun ONE Application Server 7 Performance Tuning Guide
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="145e7932-773c-4af1-8d95-28f608384bee"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 2004a] Java Management Extensions (JMX),
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b160ef05-443a-4e5a-8fc2-04669d9cd501"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 2004b] Java Object Serialization Specification
, Version 1.5.0, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1257cfe8-7ec0-42d2-8c85-f33c811d56a8"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 2004d] JVM Tool Interface
, Sun Microsystems, 2004.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="642c8ccb-feb0-493a-8283-e0eeac519492"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd22a180-e8e4-4ec1-8700-47f0162d3755"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d72f8c1-a2b7-4ea7-bc41-e269be83c6cc"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Dean F. Sutherland and William L. Scherlis, Composable Thread Coloring
, Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Association for Computing Machinery, New York, 2010.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cc1f3b1-8181-4df9-a43a-b873974661d7"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum and Maarten Van Steen, Distributed Systems: Principles and Paradigms
, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13ffd23a-8d19-4d8a-96f2-3c1f9b2e5c6c"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Josh Bloch and William Pugh, The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b760e4a3-66b6-4556-b34f-f1290a7b25aa"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Apache Software Foundation,Changelog
and Security fixes
, Tomcat documentation, 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b14ac382-777f-46e0-b4b0-c5ece996a5f2"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a462e90-b6a3-4055-bbaf-e6fd21c8871c"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium, The Unicode Standard, Version 4.0.0, defined by The Unicode Standard, Version 4.0, Addison-Wesley, Reading, MA, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45767a1a-c9c7-4213-9dbf-35f3418e2293"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007] The Unicode Consortium, The Unicode Standard, Version 5.1.0, defined by The Unicode Standard, Version 5.0, Addison-Wesley, Reading, MA, 2007, as amended by Unicode 5.1.0
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98cc6282-a213-4bbc-8dfc-8bf62293e2f5"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium, The Unicode Standard, Version 6.0.0
, The Unicode Consortium, Mountain View, CA, 2011.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46827645-29f6-4f71-9b86-be3678a09a15"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Bill Venners, Security and the Class Loader Architecture
, Java World.com, 1997.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d07555c-0b27-4806-bc8e-266e8e50583b"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Bill Venners, Failure and Exceptions, A Conversation with James Gosling, Part II
, Artima.com, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ce84260-75e8-45ab-ab64-4669975565ec"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau, Extensible Markup Language (XML) 1.0
, 5th ed., W3C Recommendation, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="798103b9-ce1a-43e4-ae93-74142e824247"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Michael S. Ware, Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Masters thesis, James Madison University, Harrisonburg, VA, 2008.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f519c4c-c57f-4fc7-8a4b-f0a59ca20697"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Chris Weber, Exploiting Unicode-enabled Software
, CanSecWest, March 2009.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68e24b50-cde8-415d-8785-2bd4b692c764"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] David A. Wheeler, Secure Programming for Linux and Unix HOWTO
, 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07727e65-de11-4931-9bf6-d8dc31e3c4a1"><ac:parameter ac:name="">White03</ac:parameter></ac:structured-macro>
[White 2003] Tom White, Memoization in Java Using Dynamic Proxy Classes
, August 2003.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="952ea7a6-1765-47b3-a44f-8bb41fa8bae8"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] John Zukowski, Creating Custom Security Permissions
, Java Developer Connection Tech Tips, May 18, 2004.