For a Java program to be secure we … [refs]. The first is that Java programs can be restricted to … [ref]. While some resources are easy to control, such as use … such as execution time [ref]. The other requirement … it is possible to audit the behavior of …
Google-1
Google-2
Copyright clearance needed for quotation.