Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2/e

Li Gong, Gary Ellison, Mary Dageforde

  • 出版商: Addison Wesley
  • 出版日期: 2003-06-06
  • 售價: $1,530
  • 貴賓價: 9.8$1,499
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 0201787911
  • ISBN-13: 9780201787917
  • 相關分類: Java 程式語言資訊安全
  • 下單後立即進貨 (約5~7天)

買這商品的人也買了...

相關主題

商品描述

Series: The Java Series

Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as “Melissa” or “I Love You.” Now improved security and robust performance peacefully coexist.

This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java.

Table of Contents:

   Preface.

How This Book Is Organized.

Acknowledgements.

About the Authors.

Preface to the First Edition.

Computer and Network Security Fundamentals.

Cryptography versus Computer Security.

Threats and Protection.

Perimeter Defense

Access Control and Security Models.

Using Cryptography.

Authentication.

Mobile Code.

Where Java Technology-Based Security Fits In.

Basic Security for the Java Programming Language.

The Java Programming Language and Platform.

Original Basic Security Architecture.

Bytecode Verification and Type Safety.

Signed Applets.

Further Enhancements.

Java 2 Security Architecture.

Security Architecture Requirements of Java™ 2.

Overview of the Java 2 Security Architecture.

Architecture Summary.

Lessons Learned.

Secure Class Loading.

Class Files, Types, and Defining Class Loaders.

Well-Known Class Loader Instances.

Class Loader Hierarchies.

Loading Classes.

SecureClassLoader Details.

URLClassLoader Details.

Class Paths.

Elements of Security Policy.

Permissions.

Describing Code.

ProtectionDomain.

Security Policy.

Assigning Permissions.

Dynamic Security Policy.

Enforcing Security Policy.

SecurityManager.

AccessControlContext.

DomainCombiner.

AccessController.

Customizing Security Policy.

Customizing Security Policy Enforcement.

Customizing Security Policy Decisions.

Customizing the Access Control Context.

Establishing Trust.

Digital Certificates.

Establishing Trust with Certification Paths.

Establishing Trust in Signed Code.

User-Centric Authentication and Authorization using JAAS.

Distributed End-Entity Authentication.

Object Security.

Security Exceptions.

Fields and Methods.

Static Fields.

Private Object State and Object Immutability.

Privileged Code.

Serialization.

Inner Classes.

Native Methods.

Signing Objects.

Sealing Objects.

Guarding Objects.

Programming Cryptography.

Cryptographic Concepts.

Design Principles.

Cryptographic Services and Service Providers.

Core Cryptography Classes.

Additional Cryptography Classes.

Code Examples.

Standard Names.

Algorithm Specifications.

Network Security.

Java GSS-API.

JSSE.

Remote Method Invocation.

Deploying the Security Architecture.

Installing the Latest Java 2 Platform Software.

The Installation Directory.

Setting System and Security Properties.

Securing the Deployment.

Installing Provider Packages.

Policy Configuration.

JAAS Login Configuration Files.

Security Tools.

Other Platforms and Future Directions.

Introduction to Java Card.

Introduction to Java 2 Micro Edition.

Security Enhancements On the Horizon for J2SE.

Brief Introduction To Jini Network Technology.

Brief Introduction to J2EE.

Client Containers.

Final Remarks.

Bibliography.