Chapter 8. Security I—execution
Introduction—RMI and security managers—Applets—Clients—Servers—System properties—Policy files—Granting
In this chapter
So far in this book we have seen how to define a remote interface, and how to construct simple RMI servers and clients. If we want to construct a large RMI application, we need to consider some issues relating to security.
This chapter describes the interaction of RMI and the Java Security Model. For more information about security across networks and secure protocols such as the Secure Sockets Layer, refer to Chapter 16.
The Java Security Model constrains the actions permitted to Java code according to its source—where the code came from. The Security Model is activated ...