Java Security Model

A Java program runs within a JVM, and the JVM itself runs as a normal process on the host machine. As a user process, the JVM enjoys all the rights and privileges associated with the user on resources such as files, devices, ports, memory, CPU, disk space, keyboard, and so on as per the rules of the underlying OS (Operating System). The Java security model works within the confines of this boundary drawn by the OS.

You may wonder—what is the need for an additional security model? Why isn't the OS security model adequate for Java programs? Let us ponder over these facts:

  1. Most Operating Systems provide a user process virtually unlimited power over the resources accessible to the user and considerable flexibility in terms of ...

Get J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.