[go: nahoru, domu]

Hopwood, 1997 - Google Patents

A comparison between java and activeX security

Hopwood, 1997

Document ID
17929375374793085868
Author
Hopwood D
Publication year
Publication venue
Network Security

External Links

Snippet

ActiveX and Java have both been the subject of press reports describing security bugs in their implementations, but there has been less consideration of the security impact of their different designs. This article asks the questions:“Would ActiveX or Java be secure if all …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Gollmann Computer security
Lampson Computer security in the real world
US8732794B2 (en) Browser plug-in firewall
US5864683A (en) System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US20050149726A1 (en) Systems and methods for secure client applications
US9218487B2 (en) Remote DOM access
US20100024036A1 (en) System and Methods Providing Secure Workspace Sessions
Atashzar et al. A survey on web application vulnerabilities and countermeasures
US20030177376A1 (en) Framework for maintaining information security in computer networks
JPH1091427A (en) Method and system for guaranteeing safety in using contents with signature
Pistoia et al. Java 2 network security
Anupam et al. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies.
Hopwood A comparison between java and activeX security
Board Jade security guide
Odirichukwu et al. Security concept in Web database development and administration—A review perspective
Guttman et al. Users' security handbook
Iglio Trustedbox: a kernel-level integrity checker
Jansen et al. Guidelines on Active Content and Mobile Code:.
Mohamed Analytical view of web security and sophisticated ways to improve web security
Koppmann Object capabilities and their benefits for web application security
Briffaut et al. A dynamic end-to-end security for coordinating multiple protections within a linux desktop
Lepofsky et al. Web Application Vulnerabilities and Countermeasures
Reis Web browsers as operating systems: supporting robust and secure web programs
Iliadis et al. Towards secure downloadable executable content: The JAVA paradigm
Koppmann et al. Utilizing Object Capabilities to Improve Web Application Security