Chapter 8. The Java 2 Permission Model

 <  Day Day Up  >  

The Java programming language has been one of the fastest -growing technologies in use on the Internet. The Java advantage is the promise that an application written once in the Java language can be run from any machine that has a Java virtual machine. From the early stages of Java development, it was realized that this feature poses the greatest challenge to Java security because code distribution is risky. For this reason, the Java 2 platform offers a built-in access-control architecture. In this chapter, we examine how access-control restrictions are enforced in the Java 2 platform. In particular, we study

  • The foundations of the Java 2 security model, which include the permission API and the concepts of security Policy , CodeSource , and ProtectionDomain

  • The Java 2 access-control architecture

  • The concept of privileged code

 <  Day Day Up  >  


Enterprise Java Security. Building Secure J2EE Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net