Useful Links
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
Permissions and Security Policies
Permission Framework
Permission Class Hierarchy
java.security.Permission Base Class
Permission Inheritance
Custom Permission Implementation
Permission Evaluation
Permission Matching
Implication Relationships
Permission Collections
Standard Permission Types
File Permissions
java.io.FilePermission
Read Operations
Write Operations
Execute Operations
Delete Operations
Directory Permissions
Network Permissions
java.net.SocketPermission
Host Restrictions
Port Restrictions
Connection Permissions
Listening Permissions
Property Permissions
java.util.PropertyPermission
System Property Access
Read vs Write Access
Runtime Permissions
java.lang.RuntimePermission
Thread Management
Class Loader Operations
Security Manager Operations
All Permissions
java.security.AllPermission
Security Implications
Appropriate Use Cases
Security Policy Files
Policy File Structure
File Format and Syntax
Comments and Documentation
Policy Entry Components
Grant Entries
CodeSource Specification
Codebase URLs
Certificate Signers
Principal-Based Grants
Permission Specifications
Permission Class Names
Target Specifications
Action Lists
Property Expansion
Default Policies
System Policy Files
User Policy Files
Policy File Locations
Policy Management
Policy File Editing
Policy Validation
Runtime Policy Updates
Programmatic Policy Management
Policy Class Usage
Dynamic Policy Modification
Custom Policy Providers
Previous
2. The Java Sandbox Architecture
Go to top
Next
4. Java Cryptography Architecture