July 2001
Intermediate to advanced
320 pages
5h 46m
English
Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises
Chapter 8 was concerned with permissions granted to code.
This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:
the identity of each party to the conversation
the integrity of the message
the privacy of the conversation.
Security concerns the identity of each party to the conversation, in two distinct ways:
authentication
authorization.
We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...
Read now
Unlock full access