Chapter 9. Object Security

If we cannot secure all our rights, let us secure what we can.

—Thomas Jefferson

As you develop applications using the Java language and platform, and especially when you consider security features, you knowingly or unknowingly depend on the underlying object orientation, such as data encapsulation, object namespace partition, and type safety. This dependence is also evident in the protection of the runtime’s internal state, which is often represented and maintained as objects. For example, when using the Java Remote Method Invocation (Java RMI) package to build distributed Java applications that span multiple JVMs, you will sometimes find it convenient or even necessary to protect the state of an object for integrity ...

Get Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.