站内搜索: 请输入搜索关键词
当前页面: 在线文档首页 > JDK 5 Documentation v1.5.0, Java 2 SDK 英文文档

Uses of Interface java.security.PrivilegedAction (Java 2 Platform SE 5.0) - JDK 5 Documentation v1.5.0, Java 2 SDK 英文文档

JavaTM 2 Platform
Standard Ed. 5.0

Uses of Interface
java.security.PrivilegedAction

Packages that use PrivilegedAction
java.security Provides the classes and interfaces for the security framework. 
java.util.concurrent Utility classes commonly useful in concurrent programming. 
javax.security.auth This package provides a framework for authentication and authorization. 
 

Uses of PrivilegedAction in java.security
 

Methods in java.security with parameters of type PrivilegedAction
static
<T> T
AccessController.doPrivileged(PrivilegedAction<T> action)
          Performs the specified PrivilegedAction with privileges enabled.
static
<T> T
AccessController.doPrivileged(PrivilegedAction<T> action, AccessControlContext context)
          Performs the specified PrivilegedAction with privileges enabled and restricted by the specified AccessControlContext.
 

Uses of PrivilegedAction in java.util.concurrent
 

Methods in java.util.concurrent with parameters of type PrivilegedAction
static Callable<Object> Executors.callable(PrivilegedAction action)
          Returns a Callable object that, when called, runs the given privileged action and returns its result.
 

Uses of PrivilegedAction in javax.security.auth
 

Methods in javax.security.auth with parameters of type PrivilegedAction
static Object Subject.doAs(Subject subject, PrivilegedAction action)
          Perform work as a particular Subject.
static Object Subject.doAsPrivileged(Subject subject, PrivilegedAction action, AccessControlContext acc)
          Perform privileged work as a particular Subject.
 


JavaTM 2 Platform
Standard Ed. 5.0

Submit a bug or feature
For further API reference and developer documentation, see Java 2 SDK SE Developer Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.

Copyright 2004 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.