ONJava.com: Discovering a Java Application's Security Requirements - Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file. - http://www.onjava.com/pub/a/onjava/2007/01/03/discovering-java-security-requirements.html
Simplify enterprise Java authentication with single sign-on - Article examining how to implement Java Single Sign-On based architecture and functionality using the GSS-API and Kerberos tickets. - http://www.ibm.com/developerworks/java/library/j-gss-sso/
IBM - Java Security Research - Java Security articles and presentations. - http://domino.research.ibm.com/comm/research_projects.nsf/pages/javasec.index.html
Java Security Hotlist - List with commentary and searchable index of Java security resources, from the authors of the book "Securing Java". By Gary McGraw and Edward Felten. - http://www.cigital.com/javasecurity/links.html
Sun Microsystems - JDBC Security Guidelines - Guidelines on developing secure Java application using JDBC - http://java.sun.com/j2se/1.3/docs/guide/jdbc/spec/jdbc-spec.frame5.html
Sun Microsystems - Java 2 Security Quiz - Java 2 Security Quiz based on the book "Inside Java 2 Platform Security". - http://java.sun.com/developer/Quizzes/security/gong.html
Build secure network applications with SSL and the JSSE API - Javaworld article by Todd Sundsted that explains how to use JSSE and SSL for securing communication channels between Java applications. - http://www.javaworld.com/javaworld/jw-05-2001/jw-0511-howto_p.html
O'Reilly - Java And Security - Article that examines various Java security services, including Java Security Manager, Security Provider Architecture, and Authentication components. - http://www.onjava.com/lpt/a/4728
Secure your Java apps from end to end - Javaworld article by Todd Sundsted that examines the foundation of Java security, including virtual machine and byte code security. - http://www.javaworld.com/javaworld/jw-06-2001/jw-0615-howto.html
JChains Java Security Policy Generator - Allows security auditors to record and optimize permissions needed by Java applications. - http://www.jchains.org/
Java Security: Web Browsers and Beyond - Paper published in 1998 by Drew Dean, Edward Felten, Dan Wallach, and Dirk Balfanz. [Postscript format]. - http://www.cs.wisc.edu/~lhl/cs740/papers/java-security2.ps
Java Security: Frequently Asked Questions - FAQ on Java security with answers from the Princeton Secure Internet Programming team. By SIP, Princeton. - http://www.cs.princeton.edu/sip/faq/java-faq.php3