Permission Classes
Table 6-1 lists
some important Permission
subclasses defined by
the core Java platform and summarizes the permissions they represent.
See the reference section for more information on the individual
classes. See http://java.sun.com/j2se/1.5.0/docs/guide/security/permissions.html
for a complete list and detailed description of these permissions
classes, along with their target and action names and a list of
methods and the permissions they require (this document is part of
the standard documentation bundle that can be downloaded along with
the JDK).
Table 6-1. Java permission classes
Permission class |
Description |
---|---|
|
An instance of this special permission class implies all other permissions. |
|
Controls the ability to play and record sound. |
|
Controls access to authentication methods in
|
|
Controls access to sensitive methods in |
|
Governs access to the filesystem. |
|
Controls the ability of a program to modify the logging configuration. |
|
Governs access to networking-related resources such as stream
handlers and HTTP authentication. See also
|
|
Governs access to system properties. |
|
Get Java in a Nutshell, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.