Secure the Clones

Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to...

Full description

Saved in:
Bibliographic Details
Published in:Logical methods in computer science Vol. 8, Issue 2; no. 2
Main Authors: Jensen, Thomas, Kirchner, Florent, Pichardie, David
Format: Journal Article
Language:English
Published: Logical Methods in Computer Science Association 31.05.2012
Logical Methods in Computer Science e.V
Subjects:
ISSN:1860-5974, 1860-5974
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first