首页
论坛
图书
开发资料
在线文档
网址
下载
联系我们
站内搜索
: 请输入搜索关键词
当前页面:
在线文档首页
>
JDK 5 Documentation v1.2.2, Java 2 SDK 英文文档
Java Security Architecture - JDK 5 Documentation v1.2.2, Java 2 SDK 英文文档
CONTENTS
|
PREV
|
NEXT
Java Security Architecture
Table of Contents
1
Introduction
1.1
The Original Sandbox Model
1.2
Evolving the Sandbox Model
2
New Protection Mechanisms -- Overview of Basic Concepts
3
Permissions and Security Policy
3.1
The Permission Classes
3.1.1
java.security.Permission
3.1.2
java.security.PermissionCollection
3.1.3
java.security.Permissions
3.1.4
java.security.UnresolvedPermission
3.1.5
java.io.FilePermission
3.1.6
java.net.SocketPermission
3.1.7
java.security.BasicPermission
3.1.8
java.util.PropertyPermission
3.1.9
java.lang.RuntimePermission
3.1.10
java.awt.AWTPermission
3.1.11
java.net.NetPermission
3.1.12
java.lang.reflect.ReflectPermission
3.1.13
java.io.SerializablePermission
3.1.14
java.security.SecurityPermission
3.1.15
java.security.AllPermission
3.1.16
Discussion of Permission Implications
3.1.17
How To Create New Types of Permissions
3.2
java.security.CodeSource
3.3
java.security.Policy
3.3.1
Policy File Format
3.3.2
Property Expansion in Policy Files
3.3.3
Assigning Permissions
3.3.4
Default System and User Policy Files
3.3.5
Customizing Policy Evaluation
3.4
java.security.GeneralSecurityException
4
Access Control Mechanisms and Algorithms
4.1
java.security.ProtectionDomain
4.2
java.security.AccessController
4.2.1
Algorithm for Checking Permissions
4.2.2
Handling Privileges
4.3
Inheritence of Access Control Context
4.4
java.security.AccessControlContext
5
Secure Class Loading
5.1
Class Loader Class Hierarchies
5.2
The Primordial Class Loader
5.3
Class Loader Delegation
5.4
Class Resolution Algorithm
6
Security Management
6.1
Managing Applets and Applications
6.2
SecurityManager versus AccessController
6.3
Auxiliary Tools
6.3.1
The Key and Certificate Management Tool
6.3.2
Policy Tool
6.3.3
The JAR Signing and Verification Tool
7
GuardedObject and SignedObject
7.1
java.security.GuardedObject and java.security.Guard
7.2
java.security.SignedObject
8
Discussion and Future Directions
8.1
Users, Authentication, and Credentials
8.2
Resource Consumption Management
8.3
Arbitrary Grouping of Permissions
8.4
Object-Level Protection
8.5
Subdividing Protection Domains
8.6
Running Applets with Signed Content
9
Summary
10
Acknowledgments
11
References
12
Revision History
CONTENTS
|
PREV
|
NEXT
Copyright
© 1997-1998 Sun Microsystems, Inc. All Rights Reserved.