Skip to Content
Java Security, 2nd Edition
book

Java Security, 2nd Edition

by Scott Oaks
May 2001
Intermediate to advanced
618 pages
20h 50m
English
O'Reilly Media, Inc.
Content preview from Java Security, 2nd Edition

Name

Security Permissions

Type

java.security.SecurityPermission

Name

Various. Security permission names are subject to wildcard asterisk matching and include all the valid strings that can be passed to the checkSecurityAccess( ) method of the security manager. All possible names are listed in here; as we explore the security API throughout the rest of the book, we’ll mention when the names apply.

addIdentityCertificate

Add a certificate to an Identity object.

clearProviderProperties.<provider name>

Remove all properties from the named provider.

createAccessControlContext

Allow creation of an access controller context.

getDomainCombiner

Allow collapsing of protection domains.

getPolicy

Retrieve the class that implements the sandbox policy.

getProperty.<prop name>

Read the given security property.

getSignerPrivateKey

Get the private key from a Signer object.

insertProvider.<provider name>

Add the named provider to the set of security providers.

loadProviderProperties.<provider name>

Bulk load the properties of the named provider.

printIdentity

Print out the contents of the Identity class.

putAllProviderProperties.<provider name>

Bulk update the properties of the named provider.

putProviderProperty.<provider name>

Add a property to the named security provider.

removeIdentityCertificate

Remove the certificate of an Identity object.

removeProvider.<provider name>

Remove the named provider from the set of security providers.

removeProviderProperty.<provider name>

Remove a property from the named security provider. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Java Security Handbook

Java Security Handbook

Jamie Jaworski, Paul J. Perrone, Venkata S.R. Krishna Chaganti
Java Cryptography

Java Cryptography

Jonathan Knudsen

Publisher Resources

ISBN: 0596001576Errata Page