Series: The Java Series
Security is an integral part of the Java platform; all Java APIs are built on
a solid security model. That model has always been stronger than the security of
other platforms, never allowing for the proliferation of a large virus such as
“Melissa” or “I Love You.” Now improved security and robust performance
This book provides a detailed look into the central workings of the Java
security architecture, including coverage of the many v1.4 enhancements. This
book reviews multiple security threats, such as Trojan horses and denial of
service attacks, and the strategies used to combat them. Students will find a
practical guide to the deployment of Java security, as well as tips on how to
customize, extend, and refine the core security architecture. In addition, it
touches on the evolution of Java security, from the restrictive days of the JDK
1.0 sandbox to the sophisticated security features available in Java 2. The book
even includes a list of 11 security bugs found in early versions of Java.
Table of Contents：
How This Book Is Organized.
About the Authors.
Preface to the
Computer and Network Security Fundamentals.
Cryptography versus Computer Security.
Threats and Protection.
Access Control and Security Models.
Where Java Technology-Based Security Fits
Basic Security for the Java Programming Language.
The Java Programming Language and
Original Basic Security Architecture.
Bytecode Verification and Type Safety.
Java 2 Security
Security Architecture Requirements of Java™
Overview of the Java 2 Security
Class Files, Types, and Defining Class
Well-Known Class Loader Instances.
Class Loader Hierarchies.
Elements of Security
Dynamic Security Policy.
Customizing Security Policy Enforcement.
Customizing Security Policy Decisions.
Customizing the Access Control
Establishing Trust with Certification
Establishing Trust in Signed Code.
User-Centric Authentication and Authorization
Fields and Methods.
Private Object State and Object
Cryptographic Services and Service
Core Cryptography Classes.
Additional Cryptography Classes.
Remote Method Invocation.
the Security Architecture.
Installing the Latest Java 2 Platform
The Installation Directory.
Setting System and Security Properties.
Securing the Deployment.
Installing Provider Packages.
JAAS Login Configuration Files.
Other Platforms and
Introduction to Java Card.
Introduction to Java 2 Micro Edition.
Security Enhancements On the Horizon for
Brief Introduction To Jini Network
Brief Introduction to J2EE.