Skip to Main Content
Enterprise Java™ Security: Building Secure J2EE™ Applications
book

Enterprise Java™ Security: Building Secure J2EE™ Applications

by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
February 2004
Intermediate to advanced content levelIntermediate to advanced
608 pages
15h 11m
English
Addison-Wesley Professional
Content preview from Enterprise Java™ Security: Building Secure J2EE™ Applications

Chapter 8. The Java 2 Permission Model

The Java programming language has been one of the fastest-growing technologies in use on the Internet. The Java advantage is the promise that an application written once in the Java language can be run from any machine that has a Java virtual machine. From the early stages of Java development, it was realized that this feature poses the greatest challenge to Java security because code distribution is risky. For this reason, the Java 2 platform offers a built-in access-control architecture. In this chapter, we examine how access-control restrictions are enforced in the Java 2 platform. In particular, we study

  • The foundations of the Java 2 security model, which include the permission API and the concepts of ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware: Fighting Malicious Code

Malware: Fighting Malicious Code

Ed Skoudis, Lenny Zeltser

Publisher Resources

ISBN: 0321118898Purchase book