Hopwood, 1997 - Google Patents
A comparison between java and activeX securityHopwood, 1997
- Document ID
- 17929375374793085868
- Author
- Hopwood D
- Publication year
- Publication venue
- Network Security
External Links
Snippet
ActiveX and Java have both been the subject of press reports describing security bugs in their implementations, but there has been less consideration of the security impact of their different designs. This article asks the questions:“Would ActiveX or Java be secure if all …
- 235000010956 sodium stearoyl-2-lactylate 0 description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gollmann | Computer security | |
Lampson | Computer security in the real world | |
US8732794B2 (en) | Browser plug-in firewall | |
US5864683A (en) | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights | |
US20050149726A1 (en) | Systems and methods for secure client applications | |
US9218487B2 (en) | Remote DOM access | |
US20100024036A1 (en) | System and Methods Providing Secure Workspace Sessions | |
Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
US20030177376A1 (en) | Framework for maintaining information security in computer networks | |
JPH1091427A (en) | Method and system for guaranteeing safety in using contents with signature | |
Pistoia et al. | Java 2 network security | |
Anupam et al. | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. | |
Hopwood | A comparison between java and activeX security | |
Board | Jade security guide | |
Odirichukwu et al. | Security concept in Web database development and administration—A review perspective | |
Guttman et al. | Users' security handbook | |
Iglio | Trustedbox: a kernel-level integrity checker | |
Jansen et al. | Guidelines on Active Content and Mobile Code:. | |
Mohamed | Analytical view of web security and sophisticated ways to improve web security | |
Koppmann | Object capabilities and their benefits for web application security | |
Briffaut et al. | A dynamic end-to-end security for coordinating multiple protections within a linux desktop | |
Lepofsky et al. | Web Application Vulnerabilities and Countermeasures | |
Reis | Web browsers as operating systems: supporting robust and secure web programs | |
Iliadis et al. | Towards secure downloadable executable content: The JAVA paradigm | |
Koppmann et al. | Utilizing Object Capabilities to Improve Web Application Security |