Java™ access control mechanisms

  • Authors:
  • Anne Anderson

  • Affiliations:
  • -

  • Venue:
  • Java™ access control mechanisms
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security people are accustomed to asking "What is this person trusted to do?" Java technology started out being concerned primarily with "What is this code trusted to do?" With the rise in distributed Java applications and the use of Java technology in multi-user environments, applications often need to make access control decisions based on who is making a particular request. Java 2 Standard Edition (J2SE™) incorporates multiple access control mechanisms, including user identity based access control. These mechanisms can be used to implement a variety of security models, and can be extended to implement additional requirements.