M. Gasser. Building a
Secure Computer System. Van Nostrand Reinhold Co., New York, 1988.
L. Gong, "Java Security:
Present and Near Future". IEEE Micro, 17(3):14--19, May/June
L. Gong, T.M.A. Lomas, R.M.
Needham, and J.H. Saltzer, "Protecting Poorly Chosen Secrets
from Guessing Attacks". IEEE Journal on Selected Areas in
Communications, 11(5):648--656, June, 1993.
J. Gosling, Bill Joy, and Guy
Steele. The Java Language Specification. Addison-Wesley, Menlo
Park, California, August 1996.
A.K. Jones. Protection in
Programmed Systems. Ph.D. dissertation, Carnegie-Mellon University,
Pittsburgh, PA 15213, June 1973.
B.W. Lampson. Protection. In
Proceedings of the 5th Princeton Symposium on Information Sciences
and Systems, Princeton University, March 1971. Reprinted in ACM
Operating Systems Review, 8(1):18--24, January, 1974.
T. Lindholm and F. Yellin. The Java
Virtual Machine Specification. Addison-Wesley, Menlo Park,
P.G. Neumann. Computer-Related
Risks. Addison-Wesley, Menlo Park, California, 1995.
U.S. General Accounting Office.
Information Security: Computer Attacks at Department of Defense
Pose Increasing Risks. Technical Report GAO/AIMD-96-84, Washington,
D.C. 20548, May 1996.
J.H. Saltzer. Protection and the
Control of Information Sharing in Multics. Communications of the
ACM, 17(7):388--402, July 1974.
J.H. Saltzer and M.D. Schroeder.
The Protection of Information in Computer Systems}. Proceedings of
the IEEE, 63(9):1278--1308, September 1975.
M.D. Schroeder. Cooperation of
Mutually Suspicious Subsystems in a Computer Utility. Ph.D.
dissertation, Massachusetts Institute of Technology, Cambridge, MA
02139, September 1972.
W.A. Wulf, R. Levin, and S.P.
Harbison. HYDRA/C.mmp -- An Experimental Computer System.