@dblp

An Evaluation of Java Application Containers according to Security Requirements.

, and . WETICE, page 178-186. IEEE Computer Society, (2005)

Links and resources

Tags