7.6 Summary

 <  Day Day Up  >  

In this chapter, we took a deep look at the foundations of Java 2 security. First, we examined how it is possible to restrict access to classes, interfaces, methods , and fields. Then, we studied in detail the three legs of Java security: class loaders, the class file verifier, and security manager.

In Chapter 8, we see how Java security allows enforcing runtime access control restrictions declaratively . This involves understanding the concepts of Permission , Policy , CodeSource , and ProtectionDomain . We also see how SecurityManager and AccessController collaborate to enforce access-control restrictions based on the security Policy in effect and how it is possible to relax some access-control restrictions by using privileged code.

 <  Day Day Up  >  


Enterprise Java Security. Building Secure J2EE Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net