| ARTICLE | PUBLICATION | LINK |
| Java 2 security and stack inspection | Gamelan.com 05/12/99. | Read It |
| Java 2’s Verifier becomes confused by German student’s security attack | Java World 04/99. | Read It |
| Software Assurance for Security | IEEE Computer 04/99. | Read It |
| IEEE Internet Computing Online: Mobile Code Security | IEEE Internet Computing 11-12/98. | Read It |
| Twelve Rules for Developing More Secure Java Code | Java World 12/98. | Read It |
| Third-party Java Security Vendors: Solutions or Snake Oil? | Java Report 12/98. | RIP |
| Privileged code in Java: Why the API changed from JDK1.2beta3 to JDK1.2beta4 | developer.com 08/31/98. | RIP |
| New Issues in Java Security | Component Strategies 07-08/98. | Read It |
| Smart cards, Java cards and security | developer.com 01/19/98. | Read It |
| Don’t push me: the security implications of push | developer.com 12/30/97. | Read It |
| Sandboxes and signatures, Part 2: How to sign code for Netscape Communicator | developer.com 10/14/97. | Read It |
| Sandboxes and signatures, Part 1: The future of executable content | developer.com 10/7/97. | Read It |
| Understanding the keys to Java security: the sandbox and authentication | JavaWorld 2(5), May 1997. | Read It |
| Avoiding Hostile Applets: How to minimize the risks of executable content | Byte Magazine, May, 1997, pages 89-92. | Read It |
| Webware Security, Inside Risks | Communications of the ACM, 40(4), page 130. April 1997. | Read It |
| Is your browser a blabbermouth? Are your ports being scanned? | JavaWorld 2(3), March 1997. | Read It |
| The dark side of executable content | NetscapeWorld 2(2), February 1997. | Read It |
| Java Security: Hostile Applets | Java Report 2(2), February 1997. | RIP |
| Plugs for Java’s Security Holes | a sidebar for the cover story of Byte Magazine, January, 1997, page 76. | RIP |
| Java Security and Type Safety | Byte Magazine, January, 1997, pages 63-64. | Read It |


