You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 252 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2945e04e-c464-4cec-acac-8230cd12e1d8"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineering Volume 22, Issue 1, 1996, 6 - 15.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5edbf3f5-5120-452e-bed7-2ebfd7ca52f9"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification, Sun Microsystems, 2006.
Available at http://download.oracle.com/javase/6/docs/api/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9af0ecf2-ae07-4711-b43c-ed692dbe3451"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Calvin Austin and Monica Pawlan, Advanced Programming for the Java 2 Platform , Addison-Wesley Longman, Boston, 2000.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="664763b0-bd4c-421e-8915-4f32d6e67acb"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, partial order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004. (accessed TODAY) Available at http://xlinux.nist.gov/dads/HTML/partialorder.html

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afcbd680-40db-4731-bfee-c25b49f77fe9"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, total order, in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006. (accessed TODAY) Available at http://xlinux.nist.gov/dads/HTML/totalorder.html

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7ef4902-d609-459d-92b7-7388a9805a70"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Joshua Bloch, Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca88f8bc-8acd-42a8-8368-20e65cb70d31"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005a] Joshua Bloch and Neal Gafter, _Java™ Puzzlers: Traps, Pitfalls, and Corner Cases_, Addison-Wesley Professional, Boston, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ef918b8-5100-4574-8e22-7769b694505e"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Joshua Bloch and Neal Gafter, Yet More Programming Puzzlers, JavaOne Conference, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf164f64-edc6-41c7-968a-0f5fe2c834ca"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Joshua Bloch, Effective Java™ Reloaded: This Time It's (Not) for Real, JavaOne Conference, 2007.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d51dc8a-83fe-4b36-87cc-f494f1753293"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a236e68-e6b3-434c-b8de-ac6a0f823434"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Joshua Bloch, Effective Java, 2nd ed., Addison-Wesley Professional, Boston, 2008.

[Bloch 2009] Joshua Bloch and Neal Gafter, Return of the Puzzlers: Schlock and Awe, JavaOne Conference, 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13d232f4-1a97-40dd-b1f5-4187dc381f3b"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Hans-J. Boehm, Finalization, Threads, and the Java™ Technology-Based Memory Model, JavaOne Conference, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c034c856-dce7-46e4-bb48-19a3125fad57"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Mary Campione and Kathy Walrath, The Java Tutorial: Object-Oriented Programming for the Internet, Addison-Wesley, Reading, MA, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="108b6b50-4734-4d21-a53d-ab6531881cf9"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0494f932-f9f2-4721-bab1-88bcadd7c388"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer, The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b976564-1813-4f2e-b3a0-85b05e84f167"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Brian Chess and Jacob West, Secure Programming with Static Analysis, Addison-Wesley Professional, Boston, MA, 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79855cae-634c-43aa-806f-f77e04cb32d8"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading, ONJava, 2005.
Available at http://onjava.com/pub/a/onjava/2005/01/26/classloading.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a8514f1-3f1a-442b-86da-ffff1aa34aea"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace, IEEE Computer, Volume 14, Issue 10, 1981.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ae7c3ea-fc0a-4fd8-a7bf-5eee30363b1f"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language, Sun Microsystems, 2009.
Available at http://www.oracle.com/technetwork/java/codeconv-138413.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="399b4513-61d5-43c0-b8df-92e45159c1ce"><ac:parameter ac:name="">CVE 11</ac:parameter></ac:structured-macro>
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1b8880a-2a21-4d12-bc0f-d3505b7c43cd"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis, Garbage Collection-Friendly Programming, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbf44889-fff6-48c6-8721-a3dddafb0031"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Cay S. Horstmann and Gary Cornell, _Core Java™ 2 Volume I - Fundamentals_, 7th ed., Prentice Hall PTR, Boston, 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d385c66-8c9f-4e30-8f20-b6e0343e1f8a"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in Pattern Languages of Program Design, James O Coplien and Douglas C Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="170785ab-49ce-4521-99e6-8b3503ea6b00"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Michael C. Daconta, When Runtime.exec() Won't, JavaWorld.com, 2000. Available at http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0249efca-2507-4b52-b345-7f1025cc5d60"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson, More Java Pitfalls, Wiley Publishing, New York, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7655f5d-acfc-4433-8b9f-08c7ebfd7ddc"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Ian F. Darwin, Java Cookbook, O'Reilly, Sebastopol, CA, 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f770ec87-4609-436b-a35e-b2bd68d0ff71"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008a] Mark Davis and Martin Dürst, Unicode Standard Annex #15, Unicode Normalization Forms, 2008. Available at http://unicode.org/reports/tr15/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1367614-f450-4667-a956-a3b0214ba8cc"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Mark Davis and Michel Suignard, Unicode Technical Report #36, Unicode Security Considerations, 2008. Available at http://unicode.org/reports/tr36/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d656c5c-939e-4c33-9ec8-a935c6e11241"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn, Programming Semantics for Multiprogrammed Computations, Communications of the ACM Volume 9, Issue 3, March 1966, pp. 143-155, DOI=10.1145/365230.365252 http://doi.acm.org/10.1145/365230.365252. Available at http://doi.acm.org/10.1145/365230.365252.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f541dc69-b835-44cf-9e81-c50537f50326"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] Build Security In, U.S. Department of Homeland Security, 2006. Available at https://buildsecurityin.us-cert.gov/bsi/home.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea9540c1-c61e-47fc-8d91-1be847987d68"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Will Dormann, Signed Java Applet Security: Worse than ActiveX?, CERT Vulnerability Analysis Blog, 2008. Available at http://www.cert.org/blogs/certcc/2008/06/signed_java_security_worse_tha.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f8e5bc3-1339-47e9-b5e3-09e6a5b8d798"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Gunjan Doshi, Best Practices for Exception Handling, ONJava.com, 2003. Available at http://onjava.com/pub/a/onjava/2003/11/19/exceptions.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a496a52d-65b8-4168-b80b-6e7cfc5f4ace"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi, Secure Design Patterns, CMU/SEI-2009-TR-010, Defense Technical Information Center, Ft. Belvoir, VA, 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e586d0d3-259c-4eee-a116-fb67272914db"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform, 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1323cc08-f9b2-4c97-9897-01174a843110"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings, Sun Microsystems, 2006. Available at http://download.oracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50ffc86a-1da6-4b39-9d4e-ae1ea63e1f2a"><ac:parameter ac:name="">EMA 2011</ac:parameter></ac:structured-macro>
[EMA 2011] Java SE 6 Documentation, Extension Mechanism Architecture, Sun Microsystems, 2011. Available at http://download.oracle.com/javase/6/docs/technotes/guides/extensions/spec.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1336a24e-60b6-4e67-bfee-054d04fe761c"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] The O'Reilly Java Authors, Java Enterprise Best Practices, O'Reilly, Sebastopol, CA, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="343232d6-f4e4-4576-a330-fc0c08e6c5ed"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfebc2ec-34e9-46d2-9619-2e4c004d0dbb"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments, Defense Technical Information Center, Ft. Belvoir, VA, 2007. Available at http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c15f942-9261-4b10-831c-5ae1d537da90"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions, 2008. Available at http://findbugs.sourceforge.net.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b477efdd-4379-4ff4-8e7f-44c667bfb0ce"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce, JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston, MA, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="425690a0-f5dd-43ec-b4ba-aa1e4d79a010"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] David Flanagan, Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b74fea4f-4cd2-4023-8acb-80826e8a8ebb"><ac:parameter ac:name="">Forman 05</ac:parameter></ac:structured-macro>
[Forman 05] Ira R. Forman and Nate Forman, Java Reflection in Action, Manning Publications, Greenwich, CT, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e4ab7c5-c6c3-46fc-8f4f-8c39fc14fd50"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security, Java/JSP, Fortify Software, 2008. Available at https://www.fortify.com/vulncat/en/vulncat/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af16d29b-854a-4034-87c4-873589ff359e"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Joshua Fox, When is a Singleton Not a Singleton?, Sun Developer Network, 2001. Available at http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39570cd4-1a6e-4e3d-bae3-a8618c887617"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions, 2008. Available at http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fb9b01e-5077-4358-9434-03aaf597ca81"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Grafter, Neal Gafter's blog, 2006. Available at http://gafter.blogspot.com.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac00140e-8b14-4b59-add8-fd0d54ebe85c"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston, MA, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="947ccee9-63d0-44a7-b3d7-d1f8ee9fd44f"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro>
[Garfinkel 1996] Simson Garfinkel and Gene Spafford, Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c813a302-778a-4d18-9f32-c8cac7ec483e"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Jess Garms and Daniel Somerfield, Professional Java Security, Wrox Press, Chicago, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d28e5c1-d4e3-460b-8553-4d82e91a62b0"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Brian Goetz, Java Theory and Practice: Don't Let the "this" Reference Escape during Construction, IBM developerWorks (Java technology), 2002. Available at http://www.ibm.com/developerworks/java/library/j-jtp0618/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12a385d7-e1df-497b-b0f7-a243eec92a61"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004a] Brian Goetz, Java Theory and Practice: Garbage Collection and Performance, IBM developerWorks (Java technology), 2004. Available at http://www.ibm.com/developerworks/java/library/j-jtp01274/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4056b712-1bcc-48c5-beed-642607edf7f3"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Brian Goetz,Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?, IBM developerWorks (Java technology), 2004. Available at http://www.ibm.com/developerworks/java/library/j-jtp05254/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32011257-ea28-49d5-81ff-7230942d2e5d"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Brian Goetz, Java Theory and Practice: Going Atomic, IBM developerWorks (Java technology), 2004. Available at http://www.ibm.com/developerworks/java/library/j-jtp11234/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea4bd3e3-bfe1-4fd5-8cef-00edd5057797"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005a] Brian Goetz, Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners, IBM developerWorks (Java technology), 2005. Available at http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9119c6b1-718d-4168-92d0-7992af98809a"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Brian Goetz, Java Theory and Practice: Plugging Memory Leaks with Weak References, IBM developerWorks (Java technology), 2005. Available at http://www.ibm.com/developerworks/java/library/j-jtp11225/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f7069d7-0d11-4a33-bdeb-c680c34203d6"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea, Java Concurrency in Practice, Addison-Wesley Professional, Boston, MA, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="878f1313-5579-4aa8-9c72-cff2c7cc13c4"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Brian Goetz, Java Theory and Practice: Good Housekeeping Practices, IBM developerWorks (Java technology), 2006. Available at http://www.ibm.com/developerworks/java/library/j-jtp03216/index.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfc8cbae-3a73-4655-896a-b5d71c64c873"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Brian Goetz, Java Theory and Practice: Managing Volatility, Guidelines for Using Volatile Variables, IBM developerWorks (Java technology), 2006. Available at http://www.ibm.com/developerworks/java/library/j-jtp06197/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3846aa7b-712c-48de-a53f-6be61e8867b1"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] David Goldberg, What Every Computer Scientist Should Know About Floating-Point Arithmetic, Sun Microsystems, March 1991. Available at http://download.oracle.com/docs/cd/E19957-01/806-3568/ncg_goldberg.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75728ec4-e735-4f2b-9eb4-4f3040dbf032"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston, MA, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07f1df92-2ded-4b1b-835c-d1dc1d314859"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Mark Grand, Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f33fa098-5787-4a5f-9fb4-bb2026f2ecbf"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Todd Greanier, Discover the Secrets of the Java Serialization API, Sun Developer Network (SDN), 2000. Available at http://java.sun.com/developer/technicalArticles/Programming/serialization/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="929621e4-1681-41d7-8861-a9463462b9a1"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Roedy Green, Canadian Mind Products Java & Internet Glossary, 2008. Available at http://mindprod.com/jgloss/jgloss.html.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90dcf41d-7038-4183-90c7-26dd6898d300"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Jeffery Grigg, Reflection On Inner Classes, 2006. Available at http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c8dacb2-5434-46dd-86c2-52172c6deafc"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] William Grosso, Java RMI, O'Reilly, Sebastopol, CA, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10bedf67-08b8-448a-9983-5a16707f23b3"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Satish Chandra Gupta and Rajeev Palanki, Java Memory Leaks - Catch Me If You Can, 2005. Available at http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c4a79f8-09e5-4c7d-b8a2-1e3fa087dd5e"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert, Immutable Objects in Java, 2006. Available at https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ae0046f-505f-46bf-a772-056219567f87"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Peter Haggar, _Practical Java™ Programming Language Guide_, Addison-Wesley Professional, Boston, MA, 2000.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b71184da-3103-4194-a943-cf331d31a82e"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Stuart Halloway, Java Developer Connection Tech Tips, March 28, 2000.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4e3a3c6-6848-46bd-90bd-4faaa24cea18"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Stuart Halloway, Java Developer Connection Tech Tips, January 30, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8838c820-9414-4fbb-9404-848a2d54cdb9"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Elliotte Rusty Harold, Java Secrets, Wiley, New York, 1997.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="437854bf-8817-4c1c-8ef9-ba739ce09474"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Elliotte Rusty Harold, Java I/O, O'Reilly, Sebastopol, CA, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18bc395c-5be6-41bb-9614-4c137e129967"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Elliotte Rusty Harold, Java I/O, 2nd ed., O'Reilly, Sebastopol, CA, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92504c61-55c6-4d5d-b886-7fcc8c047804"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities, Sun Microsystems, Make it Fly 2008, London. 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26c86dca-1f50-4a14-9841-61c63feeda0e"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro>
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? _Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04)_, Track 9, Volume 9, IEEE Computer Society, January 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4924406e-72b5-4c06-9eda-c98d001609fd"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Kevlin Henney, Null Object, Something for Nothing, 2003. Available at http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="737d4329-fb25-421d-a726-05df62690ea3"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Ron Hitchens, _Java™ NIO_, O'Reilly, Sebastopol, CA, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a57fa18a-cd67-4247-b786-f95c22fc5957"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Charles Hornig, Advanced Java™ Globalization,JavaOne Conference, 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0c2472b-5001-4952-8c8c-76fb36218a01"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] David Hovemeyer and William Pugh, Finding More Null Pointer Bugs, But Not Too Many, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program Analysis for Software Tools and Engineering, 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9882e4c2-53e7-4e79-89ca-b9b766b2bccc"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro>
[Howard 2002] Michael Howard and David C. LeBlanc, Writing Secure Code, 2nd ed., Microsoft Press, Redmond, WA, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea3eaf2d-64e1-468b-b10f-b442f1cd0059"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] J. Hunt and F. Long, Java's Reliability: An Analysis of Software Defects in Java, Software IEEE Proceedings, 1998.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e859f296-1bd9-42c6-87ea-b074d627c057"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis Techniques for System Reliability - Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed., International Electrotechnical Commission, Geneva, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6cca129-d37f-4b02-a895-0a7dde7c4530"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE, Standard for Binary Floating-Point Arithmetic (IEEE 754-1985), 2006. Available at http://grouper.ieee.org/groups/754/.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d325587-cca9-4e7e-b81c-63278cfa5ffc"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772. Information TechnologyProgramming LanguagesGuidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, October 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="826ffd86-3210-4f86-b3d6-41cb95a70352"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] Java™ 2 SDK, Standard Edition Documentation, Sun Microsystems, J2SE Documentation version 1.3, Sun Microsystems, 2000.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5045f067-e8ec-472e-9946-f5805e63515e"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro>
[J2SE 2011] Java™ SE 7 Documentation, J2SE Documentation version 1.7, Oracle Corp., 2011.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e47dfaec-3531-479b-896a-c25c6426dc60"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification, Sun Microsystems, 2000.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37a00483-7737-4b6b-a2e3-da02e2c1400d"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] Java - The Java Application Launcher, Sun Microsystems, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="512d2af8-0333-42f7-8037-2166af3fb058"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani, Java 2 Network Security, Prentice Hall, Upper Saddle River, NJ, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8296acae-7bfb-48fd-9bb1-4e9d6e93dd1b"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Oracle, Generics, Sun Microsystems, 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9d1dd50-cf1a-4855-9178-2e08dc5a8dac"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Scott Oaks and Henry Wong, Java Threads, 2nd ed., O'Reilly, Sebastopol, CA, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c96b6db7-462c-4127-9b65-3fee44d8ab85"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Scott Oaks and Henry Wong, Java Threads, 3rd ed., O'Reilly, Sebastopol, CA, 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8acdc610-e4a1-4224-8785-ed68f8f8804e"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java™ Platform, Standard Edition 7 documentation, Sun Microsystems, December 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ca5e32c-047d-411d-a303-4eabc4e9020b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha, The Java Language Specification, 3rd ed., Prentice Hall, Upper Saddle River, NJ, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="158940c7-6fc4-4f6b-bd35-a0a582a3e9ee"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53aa7ab8-90cd-4c3a-8729-02ff2ca7e254"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a8b3f5c-2584-4b59-9c27-45ee68d9d6bd"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e8e6b96-929c-4c2f-a1d4-f99d1681ecf5"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper), Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3ef49b9-7122-4412-b94e-1f03f677f479"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bc9df38-bbc4-4869-a306-ea54eab4101b"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ee8854d-f295-4ec5-b34c-548b893c4abc"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: Java™ Memory Model and Thread Specification. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22249139-107f-4823-b4c0-22cdf2121d4e"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdc7ee89-6588-4ece-aa09-dd27f81b745d"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59eb572d-7eb6-4db6-a1cf-e0eb1601f822"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] The Ultimate Java Puzzler by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed3d0b16-a07e-4098-abd6-f51ac8369a56"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="433ddd38-a4f3-4c44-a8e3-3a16fb1bffd7"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02180f60-6b0b-4a38-9e9b-aff22ba46132"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Java™ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)

[Lai 2008] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99a19276-2bd0-43b9-85ef-08200298be7d"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb4848bd-446c-440c-b136-627fa462894f"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2aa4c3e7-152c-4af8-9150-7692b1198351"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Correct and Efficient Synchronization of Java™ Technology based Threads, by Doug Lea and William Pugh. JavaOne Conference. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3e30a07-68ed-4687-b12f-bb3e6dc955bc"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] The JSR-133 Cookbook for Compiler Writers, by Doug Lea. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bf577cc-b6d8-48ec-b913-a46c160e8332"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Robust and Scalable Concurrent Programming: Lessons from the Trenches, by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c2e7be5-41fd-44ac-acd7-5476aed42b22"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2092c0de-6899-4de5-a9c4-8cef1dfd833e"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Dynamic Class Loading in the Java™ Virtual Machine, by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eaa6b886-06fd-4e04-8dda-0c1401350e67"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Using prototypical objects to implement shared behavior in object-oriented systems. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fa4b364-05d0-49bc-bb32-3318e7e71a00"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Security Issues in Garbage Collection, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26c65a9a-6b3c-4cb6-b0e3-e82a01dfd7c4"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48d7e6d4-9715-4740-971f-a5e82442bdf6"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro>
[LSOD 02] Last Stage of Delirium Research Group. Java and Java Virtual Machine Security. Poland: Last Stage of Delirium Research Group,
2002. http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c24482d6-0088-48b1-875e-accbd0cc07ee"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5c9ba74-43c5-4904-9a0e-085b44b0ca78"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe73f659-dd4a-42d6-ab44-fc866205f6c3"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Compressing and Decompressing Data Using Java APIs, by Qusay H. Mahmoud. Oracle. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5007e44-7993-45e0-9cbd-75964210983c"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2cee516-b0a0-4749-ac08-e9de45e210ef"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] JSR 133 (Java Memory Model) FAQ, by Jeremy Manson and Brian Goetz. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c77d8a74-3040-4089-aa99-a30011296544"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] The Java™ Memory Model: the building block of concurrency, by Jeremy Manson and William Pugh, JavaOne Conference. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bc1fd5d-be78-4f53-bda0-e08189dc2a13"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Granularity, by Robert C. Martin. (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ad3955b-539f-49e7-8b4b-bb3dd178bcb1"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cd41d5a-ecda-4ba0-a92a-7ed054276605"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a145530b-c86c-4715-80de-29512f7ace67"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Twelve rules for developing more secure Java code, Gary McGraw and Edward W. Felten, JavaWorld.com. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b321b3dd-c047-472e-bc11-534e49ba1a16"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro>
[Mettler 2010A] A. Mettler, D. Wagner, and T. Close. Joe-E: A security-oriented subset of Java. In 17th Network & Distributed System Security Symposium, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3ea2bf9-217e-45cd-ace2-b02f1b521be3"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro>
[Mettler 2010B] Adrian Mettler and David Wagner. 2010. Class properties for security review in an object-capability subset of Java: (short paper). In Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, New York, NY, USA, , Article 7 , 7 pages. DOI=10.1145/1814217.1814224 http://doi.acm.org/10.1145/1814217.1814224

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f58b67ab-d754-4a5a-81bf-ab536104771d"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Java™ Platform Concurrency Gotchas, by Alex Miller, Terracotta. JavaOne Conference. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f5d2f21-9acb-421e-bdaa-b3e515c6ea62"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro>
[MITRE 2011] Common Weakness Enumeration, MITRE Corporation. (2011)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24f0faf1-953e-481c-9020-419355ea3efb"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13cc9397-4c44-4660-b101-c651e4c4de22"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Ruining Security with java.util.Random Version 1.0, by Jan P. Monsch. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d656c42d-6051-44b9-a668-32ae17c57641"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Using SQL Escape Sequences, Microsoft Corporation. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bec562c-59da-4eef-add0-08757b593ec0"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] MIDlet Packaging with J2ME, by John W. Muchow (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67f522e8-b213-4f68-be98-070353131ffb"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95d652c1-7e5d-4430-8143-604644ca018b"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ea5f4f6-06cd-4547-bfc7-eae6d66835e8"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Java™ Generics and Collections: Tools for Productivity, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46d7fc0b-fb81-4a6f-8eda-ea3dc053f2db"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] What Are Race Conditions? Some Issues and Formalization, by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin — Madison. (1992)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48647b32-fd89-42ee-914d-747723d4b926"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9264cc48-722d-43bc-88d4-9228a1569c04"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15dd25ee-de97-4b5f-86c7-a6be907b6e6d"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Decompiling Java, by Godfrey Nolan, Apress. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef25c037-a663-40a3-8f65-b06dbfad1936"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b93cbb69-4782-4182-907e-1c7730d495eb"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 2004] The Open Group Base Specifications Issue 6. The IEEE and The Open Group. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a02c1c4-5010-497e-9666-017688b1f950"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning, Oracle Corporation. (2010)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c8d8540-cdaf-4090-a45a-5168dfa4cba2"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] A Guide to Building Secure Web Applications and Web Services. The Open Web Application Security Project. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab2c8ea5-bf79-4183-8f83-d704c3132ffe"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP TOP 10 FOR JAVA EE. The Open Web Application Security Project. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f72e792-84ef-4ae5-9573-21975f9d7fb1"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d11b10d-b9d2-4fb8-9a7d-3ff8125d72a4"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java™ SE 6 Development Kit (JDK), Sun Microsystems, Inc. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72e94caa-3a6a-429c-a409-ea87c33ed20c"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Beware the dangers of generic Exceptions, by Paul Philion, JavaWorld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a49731e-1fd4-46b1-8ba9-3f93099132c6"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b87f77a9-d48b-4b00-9193-36bf82837838"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea24cfc9-3888-498d-a4bb-fb92750b4e9a"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5927ca7c-103e-40ee-bc2f-7b11e6a1b652"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] The Java Memory Model (discussions reference) by William Pugh, Univ. of Maryland. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bd6a0d2-480a-400b-b4b3-a43ec9d194ed"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Defective Java Code: Turning WTF Code into a Learning Experience, by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e867510-2fe7-4323-bba2-0dbcf73a340a"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Defective Java Code: Mistakes That Matter, by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c580280-13e0-4ce3-ba1f-9de24ca73f25"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24, Reasoning. 14 Nov 2003. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bacc2e3-a0f1-44e7-ac47-111769d65062"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2261e37-f0b0-4af2-958f-4ae01f480e34"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] The Elements of Java Style, by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3809306c-4334-4468-a70d-e804c4632fa9"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Fallacies of Distributed Computing Explained, by Arnon Rotem-Gal-Oz. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13971469-b200-4225-b3fe-92c24c281a30"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Breaking Java exception-handling rules is easy, by Vladimir Roubtsov, JavaWorld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7e72c17-a81f-4179-ad38-040dc82acca5"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Into the mist of serialization myths, by Vladimir Roubtsov, JavaWorld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71d9cefd-22cc-4338-a44e-0799d00a7af9"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35361703-d7ae-4ea7-b082-b8312b30cb4a"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." Proceedings of the IEEE 63, 9 (September 1975): 1278-1308.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd8c6303-3dbd-4b02-a589-bd499c02e86b"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0, Sun Microsystems, Inc. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21d1d9c1-630b-4823-b0b2-24c84ebfac9d"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b88b83d-6473-4c55-9abc-d5ef17998302"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cc238b5-cf7c-41e5-a0d9-5ed5c599ffa4"><ac:parameter ac:name="">Schoenefeld 02</ac:parameter></ac:structured-macro>
[Schönefeld 2002] Schönefeld, Marc. “Security Aspects in Java Bytecode Engineering.” Blackhat Briefings 2002, Las Vegas, August 2002. http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-schonefeld-java.ppt.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac016bfd-89df-46b7-bc34-96c23dbed743"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schönefeld 2004] Schönefeld, Marc. Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5da276a3-2816-4122-943b-726585979961"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Avoiding Checked Exceptions, by Don Schwarz, ONJava (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a9f1356-eec3-4548-a72d-bb13fcc24c78"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Java Tip 134: When catching exceptions, don't cast your net too wide, by Dave Schweisguth. Javaworld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88d014d2-a874-41c1-b804-a52055730c41"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] SUN Developer Network, Sun Microsystems, Inc. (1994-2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72ec003e-4c6b-4f58-a20c-9626a6fc2b6b"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d80457a-f3dc-428b-aa39-501282b453ed"><ac:parameter ac:name="">Seacord 2008</ac:parameter></ac:structured-macro>
[Seacord 2008] Seacord, Robert C. The CERT C Secure Coding Standard. Boston, MA: Addison-Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba630943-01dc-4f17-89ae-ce161a1d3d26"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95193688-b854-4f5a-83aa-3e8eaa09c177"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro>
[Secunia 2008] Secunia Advisories. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be39682d-699a-40d0-ac1d-df183aa31562"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90e33f5e-c31e-47ca-90d9-52557f439a7a"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html, Sun Microsystems, Inc. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02678957-cd1f-4ee4-88e1-6704fcb4f6de"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Avoid the dangers of XPath injection, by Robi Sen, IBM developerWorks. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45dbe67d-e9ce-4b12-aaca-108d32b33311"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bbbfe77-6f19-4b7e-87dc-aade8b0acbec"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, G. L. "Arithmetic shifting considered harmful." SIGPLAN Not. 12, 11 (November 1977), 61-69.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1aa3936c-2ab9-481b-a2a8-6deb2cd04b6e"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Java Developer Connection Tech Tips "Using the Varargs Language Feature", Daniel H. Steinberg, January 4, 2005. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3a16121-5168-44f7-83b6-6955ddc642fd"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Secure Coding Antipatterns: Avoiding Vulnerabilities, by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0392a52-a74a-4da4-be69-47343e541b21"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] XXE (Xml eXternal Entity) attack, by Gregory Steuck (www.securityfocus.com). (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0faf5ef9-e930-4291-a2a3-d8525a4d036f"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
[Sun 02] Sun Microsystems, Inc. Reflection. http://java.sun.com/j2se/1.5.0/docs/guide/reflection/index.html (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2a78712-9239-45fa-862a-d08481abe1f8"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f56f98c-97da-4c1c-815a-d41a5662b5bf"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide, Sun Microsystems, Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e06a511e-5f31-4044-bd7d-6b30ca5f2519"><ac:parameter ac:name=""> Sun 04a</ac:parameter></ac:structured-macro>
[Sun 04a] Sun Microsystems, Inc. Java Management Extensions (JMX). http://java.sun.com/j2se/1.5.0/docs/guide/jmx/index.html (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="214a4d47-9cb3-4a57-8048-3279a6f3f493"><ac:parameter ac:name=""> Sun 04b</ac:parameter></ac:structured-macro>
[Sun 04b] Sun Microsystems, Inc. Java Object Serialization Specification, Version 1.5.0. http://java.sun.com/j2se/1.5.0/docs/guide/serialization/spec/serialTOC.html (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f685ece-8a7b-445d-9ef1-17a052b065a8"><ac:parameter ac:name=""> Sun 04d</ac:parameter></ac:structured-macro>
[Sun 04d] Sun Microsystems, Inc. JVM Tool Interface. http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/jvmti.html (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78572f94-c04c-49f6-aeb0-f01957743478"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java™ Platform, Standard Edition 6 documentation, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1dbb1b1-a5d3-4d81-b63d-e5dae6cd27f9"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java™ Plug-in and Applet Architecture, Sun Microsystems, Inc. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03dfc344-6370-477e-af72-a70abc90861a"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Composable thread coloring, by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dee72517-869f-44a3-b5fe-b043753b7e3e"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum, Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2/E. March, 2003. ISBN-10: 0132392275.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da9ed731-89a2-47ec-8edb-fc331c9436df"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84b712a3-1933-4905-b27c-30bf6ee58ccf"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat documentation, Changelog and Security fixes, the Apache Software Foundation. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="990bf752-6f23-4b11-801f-62df5c66e7fb"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials, Sun Microsystems, Inc. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3880d1e-be04-4e95-a945-1c7067934bb8"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro>
[Unicode 2003] The Unicode Consortium. The Unicode Standard, Version 4.0.0, defined by: The Unicode Standard, Version 4.0 (Boston, MA, Addison-Wesley, 2003. ISBN 0-321-18578-1)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f88b1ce-81df-44c0-97da-537456f7c291"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro>
[Unicode 2007]
The Unicode Consortium. The Unicode Standard, Version 5.1.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007. ISBN 0-321-48091-0), as amended by Unicode 5.1.0 (http://www.unicode.org/versions/Unicode5.1.0/).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f97b725-2fe1-4936-a259-9c3c9a457dbd"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro>
[Unicode 2011] The Unicode Consortium. The Unicode Standard, Version 6.0.0, (Mountain View, CA: The Unicode Consortium, 2011. ISBN 978-1-936213-01-6)http://www.unicode.org/versions/Unicode6.0.0/

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cba4bbe4-180a-4b3f-a264-c399a8891c95"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Security and the class loader architecture Java World.com, by Bill Venners. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61cde4c4-52e5-4f93-99b7-db798d2cf928"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Failure and Exceptions, A Conversation with James Gosling, Part II, by Bill Venners. Artima.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="566a0e96-7c34-4845-8829-d8f49125e353"><ac:parameter ac:name="">VU439395</ac:parameter></ac:structured-macro>
[VU#439395] Lipson, Howard. Vulnerability Note VU#439395, Apache web server performs case sensitive filtering on Mac OS X HFS+ case insensitive filesystem, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4300cb28-38a3-4ce6-a0fa-1c47fd1eacdb"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Extensible Markup Language (XML) 1.0 (Fifth Edition), W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29eeff6c-1d41-476f-933b-6d5c2016e684"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools, Michael S. Ware. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f3793d3-4d22-4787-8fa7-70e9245ca720"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Exploiting Unicode-enabled Software, by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61809caf-4e0b-4df7-b525-911f3a8d6407"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Secure Programming for Linux and Unix HOWTO, David A. Wheeler. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca2cc108-13cf-4ebb-b37c-500f85e41277"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Java Developer Connection Tech Tips "Creating Custom Security Permissions", John Zukowski, May 18, 2004. (2004)

  • No labels