9.1. Permission-based Security inside the Java 2 Platform

Permission-based security is used to make access control decisions. Given a piece of code, the security mechanism ensures that it is authorized to do what it wants to do. Let's review the entities and process involved in reaching such a decision. For a complete treatment of the subject, consult Inside Java™ 2 Platform Security [24].

9.1.1. Code Source

In the Java runtime environment, the object that is under security scrutiny is an instance of a class, with security-related characteristics that are encapsulated by its code source. The code source identifies the following two aspects of a class:

  1. The origin of the class. This is represented by a URL that points to where the class was loaded. ...

Get Programming Open Service Gateways with Java Embedded Server™ Technology now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.