Add new attachment

Only authorized users are allowed to upload new attachments.

This page (revision-13) was last changed on 29-May-2007 23:13 by JanneJalkanen  

This page was created on 25-Feb-2006 01:04 by 89.55.177.112

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Difference between version and

At line 34 changed one line
However, [[it is possible that]] when the {{Policy}} object is constructed, the code that implenents a particular {{Permission}} class has yet to be loaded or is not available for loading. For example, a referenced {{Permission}} class might be in a JAR file that will eventually be downloaded. In this case, the {{Permission}} has yet to be defined within the Java runtime environment. For such a class, an {{UnresolvedPermission}} object is instantiated instead, as a placeholder that contains information about the permission... Unresolved permissions of a particular type must be resolved before an access control decision can be made about a permission of the actual type... To resolve an {{UnresolvedPermission}}, the policy decision point must locate and instantiate the appropriate permission class type...
However, [[it is possible that] when the {{Policy}} object is constructed, the code that implenents a particular {{Permission}} class has yet to be loaded or is not available for loading. For example, a referenced {{Permission}} class might be in a JAR file that will eventually be downloaded. In this case, the {{Permission}} has yet to be defined within the Java runtime environment. For such a class, an {{UnresolvedPermission}} object is instantiated instead, as a placeholder that contains information about the permission... Unresolved permissions of a particular type must be resolved before an access control decision can be made about a permission of the actual type... To resolve an {{UnresolvedPermission}}, the policy decision point must locate and instantiate the appropriate permission class type...
At line 53 added 2 lines
P.S. Li Gong's book is outstanding, by the way, and I recommend it to anyone who wishes to explore the innards of Java security. Took me several read-throughs to really grok it, but it was well worth the effort.
Version Date Modified Size Author Changes ... Change note
13 29-May-2007 23:13 5.571 kB JanneJalkanen to previous
12 17-Jul-2006 21:51 5.449 kB Janne Jalkanen to previous | to last
11 17-Jul-2006 11:30 18.999 kB 211.53.198.25 to previous | to last
10 29-Mar-2006 10:18 5.449 kB 24.218.63.149 to previous | to last
9 29-Mar-2006 10:13 5.382 kB 24.218.63.149 to previous | to last
8 29-Mar-2006 10:13 5.352 kB 24.218.63.149 to previous | to last
7 29-Mar-2006 10:13 5.335 kB 24.218.63.149 to previous | to last
6 29-Mar-2006 10:11 5.121 kB 24.218.63.149 to previous | to last
5 29-Mar-2006 10:10 5.119 kB 24.218.63.149 to previous | to last
4 29-Mar-2006 10:09 5.118 kB 24.218.63.149 to previous | to last
3 29-Mar-2006 10:09 5.116 kB 24.218.63.149 to previous | to last
2 27-Feb-2006 07:28 0.667 kB 24.218.63.149 to previous | to last
1 25-Feb-2006 01:04 0.666 kB 89.55.177.112 to last
« This page (revision-13) was last changed on 29-May-2007 23:13 by JanneJalkanen