{"title":"Java新的安全体系结构方向","authors":"L. Gong","doi":"10.1109/CMPCON.1997.584679","DOIUrl":null,"url":null,"abstract":"The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowledge of Java basics and general security issues. The article is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.","PeriodicalId":412248,"journal":{"name":"IEEE Computer Society International Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":"{\"title\":\"New security architectural directions for Java\",\"authors\":\"L. Gong\",\"doi\":\"10.1109/CMPCON.1997.584679\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowledge of Java basics and general security issues. The article is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.\",\"PeriodicalId\":412248,\"journal\":{\"name\":\"IEEE Computer Society International Conference\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"43\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Computer Society International Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPCON.1997.584679\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Computer Society International Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPCON.1997.584679","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowledge of Java basics and general security issues. The article is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.