Chapter 16. Security II—the conversation
Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises
In this chapter
Chapter 8 was concerned with permissions granted to code.
This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:
the identity of each party to the conversation
the integrity of the message
the privacy of the conversation.
Security concerns the identity of each party to the conversation, in two distinct ways:
We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...