O'Reilly logo

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition by Mary Dageforde, Gary Ellison, Li Gong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3.3. Architecture Summary

As a summary of the overall process of how the Java 2 security architecture works, this section takes you through the handling of an applet or application. The following steps occur when viewing an applet, either through a Web browser or appletviewer or when running a Java application, possibly from the command line by invoking the program called java.

1.
A class file is obtained and accepted if it passes preliminary bytecode verification.
2.
The class’s code source is determined. If the code appears to be signed, this step includes signature verification.
3.
The set of static permissions, if any, to be granted to this class is determined, based on the class’s code source.
4.
A protection domain is created to mark the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required