O'Reilly logo

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition by Mary Dageforde, Gary Ellison, Li Gong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8.4. User-Centric Authentication and Authorization Using JAAS

When Java technology is used to construct a full-fledged distributed system, a whole new range of distributed systems security issues, such as those mentioned in Chapter 1, must be addressed. For example, additional mechanisms are needed to make Remote Method Invocation (RMI) secure in the presence of hostile network attacks. Jini Network Technology takes full advantage of RMI. Jini Network Technology enables digital devices to simply connect together, so service registration and location must be securely managed if the environment contains coexisting but potentially hostile parties. Thus, a full set of higher-level services must be secured, such as transactions for e-commerce. In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required