18.1. Assumptions
The following assumptions contributed to the design of the security mechanism and ensured ample flexibility in its implementation:
MIDlets do not need to be aware of the security policy except for security exceptions that may occur when using APIs.
A MIDlet suite is subject to a single protection domain and its permissible actions. (See Section 18.3.3, “Protection Domain,” for an explanation of protection domains.)
The internal representation of protection domains and permissions is implementation specific. (See Section 18.3.1, “Permissions,” for an explanation of permissions.)
The user interface for presenting configuration settings and the results of authentication attempts to the user is implementation-dependent and outside ...
Get Programming Wireless Devices with the Java™ 2 Platform, Micro Edition, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.