CONTENTS | PREV | NEXT Java Security Architecture


Table of Contents


1 Introduction
1.1 The Original Sandbox Model
1.2 Evolving the Sandbox Model

2 New Protection Mechanisms -- Overview of Basic Concepts

3 Permissions and Security Policy
3.1 The Permission Classes
3.1.1 java.security.Permission
3.1.2 java.security.PermissionCollection
3.1.3 java.security.Permissions
3.1.4 java.security.UnresolvedPermission
3.1.5 java.io.FilePermission
3.1.6 java.net.SocketPermission
3.1.7 java.security.BasicPermission
3.1.8 java.util.PropertyPermission
3.1.9 java.lang.RuntimePermission
3.1.10 java.awt.AWTPermission
3.1.11 java.net.NetPermission
3.1.12 java.lang.reflect.ReflectPermission
3.1.13 java.io.SerializablePermission
3.1.14 java.security.SecurityPermission
3.1.15 java.security.AllPermission
3.1.16 Discussion on Permission Implications
3.1.17 How To Create New Types of Permissions
3.2 java.security.CodeSource
3.3 java.security.Policy
3.3.1 Policy File Format
3.3.2 Property Expansion in Policy Files
3.3.3 Assigning Permissions
3.3.4 Default System and User Policy Files
3.3.5 Customizing Policy Evaluation

4 Access Control Mechanisms and Algorithms
4.1 java.security.ProtectionDomain
4.2 java.security.AccessController
4.2.1 Algorithm for Checking Permissions
4.2.2 Handling Privileges
4.3 Inheritence of Access Control Context
4.4 java.security.AccessControlContext

5 Secure Classloader, GuardedObject, and SignedObject
5.1 java.security.SecureClassLoader
5.2 Security Management for Applets and Applications
5.3 java.security.GeneralSecurityException
5.4 java.security.GuardedObject and java.security.Guard
5.5 java.security.SignedObject

6 Auxiliary Tools
6.1 The Key and Certificate Management Tool
6.2 Policy Tool
6.3 The JAR Signing and Verification Tool

7 Discussion and Future Directions
7.1 Running Applets with Signed Content
7.2 More on Secure Classloading
7.3 More on Access Control
7.4 Subdividing Protection Domains
7.5 Arbitrary Grouping of Permissions
7.6 Users, Authentication, and Credentials
7.7 Object-Level Protection

8 Summary

9 Acknowledgments

10 Pending Changes

11 References

12 Revision History


CONTENTS | PREV | NEXT
Copyright © 1997-1998 Sun Microsystems, Inc. All Rights Reserved.