References
- Proceedings of the Third ACM Workshop on Role-Based Access Control Role-Based Access Control in Java Giuri L.
- Proceedings of the Fourth ACM Workshop on Role-Based Access Control Role-Based Access Control on the Web Using Java Giuri L.
- Proceedings of 11th Annual Computer Security Application Conference Role-Based Access Control(RBAC): Features and Motivations Ferraiolo D.;Cuguni J.;Kuhn R.
- IEEE Computer v.29 no.2 Role-Based Access Control Models Sandhu R. S.;Coyne E. J.;Feinstein H.;Youman, C. E.
- International Workshop on Security(IWSEC'99) held conjunction with IEEE ICPP'99 An Integrity Enforcement Application Design and Operation Framework HyungHyo Lee;BongNam Noh
- Java Authentication and Authorization Service(JAAS)
- Java Authentication and Authorization Service(JAAS) 1.0 Developer's Guide
- The Java Language Specification Gong L.;Joy B.;Steele G.
- The Java Virtual Machine Specification Lindholm T.;Yellin F.
- Java Security: Hostile Applets, Holes and Antidotes McGraw G.;Felten W. F.
- Securing Java McGraw G.;Felten W. F.
- Java Security Scott Oaks
- Java 2 Network Security(2nd Ed.) Marco P.;Dunane F. R.;Deepak G.;Milind N.;Ashok K. R.
- Proceedings of ICDCS Experience with Secure Multi-Processing in Java Balfanx D.;Gong L.
- Proceedings of USENIX Symposium on Internet Technologies and Systems Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 Gong L.;Mueller M.;Prafullchandra H.;Schemers R.
- java.sun.com Frequently Asked Questions-Java Security Sun Microsystems
- Secure Internet Programming Java Security FAQs Princeton Secure Internet Programming Team
- IEEE Concurrency Interview: Amit Sheth on Workflow Technology Sushil Jajodia
- IEEE Concurrency Process Driving the Networked Economy Amit P.;Sheth, Wil van der Aalst;Ismailcem B. Arpinar
- Distributed and Parallel Databases v.3 no.2 An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure Georgakopoulos D.;Hornik M.;Sheth A.
- The Eighteenth Symposium on Reliable Distributed Systems Authorization Methods for E-Commerce Applications R. Oppliger
- Master's Thesis, University of Georgia Security for the METEOR Workflow Management System Mei Fan