java security

Learn about java security, we have the largest and most updated java security information on alibabacloud.com

"Java Security Technology Exploration Path series: J2SE security Architecture" II: Security Manager

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellFunctions of a security managerA security manager is a class that allows a program to implement a security policy that checks the access rights of resources that need to be protected and other operational permissions that it requires to protect the system from m

"Java Security Technology Exploration Road Series: J2SE Security Architecture" VI: Security management tools

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwell"Java Security Technology Exploration Road Series: J2SE Security Architecture" Chapter list"Java Security Technology Exploration Road Series: J2SE

Java Security Sandbox (iii) security features built into Java virtual machines (and languages)

Java is a type-safe language that has four types of security mechanisms known as the security sandbox mechanism to guarantee the security of the language, and these four types of security sandboxes are: .class File verifier

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" of 20: SASL (a): SASL architecture Introduction. MD

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellThe simple Authentication and Security layer (SASL) defines a protocol for authentication and the creation of a security layer between client and server applications, where the establishment of the security layer is optional. SASL defines how authentication data

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" 16: Jaas (III): JAAS programming model

authorizationsJars authorization enhances the Java security model by adding access control mechanisms based on users, groups, and roles. It allows setting withUser-level and operation-level permissions to enforce access control for code performers. The subject object created during the authentication process represents an authenticated entity. Subject objects typically contain a set of principal, where eac

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" 22: SASL (III): SASL programming model. MD

--Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellInstalling Java SASLSASL security providers provide implementations of the SASL mechanism, and each provider implementation may support one or more SASL mechanisms that can be registered with JCA. In J2SE 5.0, the default method automatically registers the SUNSASL provider as a JCA provider in the

"Java Security Technology Exploration Path series: Java Extensible security Architecture" III: JCA (ii): JCA classes and interfaces

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellA JCA provider Class 1.1 Java.security.ProviderThe provider class provides implementation of Java security and inherits the properties class to ensure that the program has sufficient permissions to perform related operations. Provides an internal class servicethat encapsulates the properties of a service.

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" XI.: JSSE (a): JSSE architecture Introduction

providers, which are placed in front of the SUNJCE provider to use them.The default SUNJCE provider provides the following features: Implement the SSL3.0 and TLS1.0 protocols. Implements the ssl/i ' LS state machine (sslengine), which allows the processing of buffer data to generate ssl/i ' LS encoded data(J2SE 5.0 and later). Implements the key factory and key generator used to support the RSA algorithm. Implement the most common SSL and TLS cryptographic algorithm suite t

Java Security Technology Quest series: Java Extensible Security Architecture 12: JSSE (ii): JSSE Classes and interfaces

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwell Javax.net. ': Contains a set of core classes and interfaces for creating basic client and server sockets. Javax. Net. SSL.,: Contains a set of core classes and interfaces for creating secure client and server SSL sockets and for secure httpurl connections. Javax. Security. The Cert.,:java

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" 13: JSSE (III): JSSE programming model

(). Before you call Wrap () unwrap () or beginhandshake (), you must set all configuration parameters. All of these methods trigger the first handshake. The movement of data through the engine is done by calling Wrap () (outbound data) or unwrap () (inbound data). Depending on the state of Sslengine, The Wrap () call may consume application data from the source buffer and may also generate network data in the destination buffer. Outbound data may contain application data and/or handshake data.

"Java Security Technology Exploration Road Series: Java Extensible Security Architecture" eight: JCP (a): JCP architecture Introduction

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellJCP (Java certpath) is a Java certificate path that integrates the functionality of certificate checking, verification, and validation for your application. Features include the following: Interpreting and managing certificates Certificate Revocation List Certificate path The JCP API implemen

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" XV: Jaas (ii): Jaas Classes and interfaces

system-level access control policy that is used to authorize based on an authenticated principal.3.2 javax.security.auth.AuthPermissionAuthpernussion (Authorization class, javax.security.auth.AuthPermission): Encapsulates the basic permissions required for Jaas authorization, and controls the object policy, Subject; Access to LoginContext and configuration.3.3 Javax.security.auth.PrivateCreclentialsPermissionPrivatecredenti address Pang Xia Jia rission (private credential permission class, java

Java Security Technology Quest series: Java Extensible security Architecture 18: JGSS (ii): JGSS Classes and interfaces

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellA Java Gss-apiJava GSS-API classes and interfaces are located in the. Org.ietf.jgss. ' Package, the package is part of J2SE 1.4.1.1 org.ietf.jgss.channelbinding1.2 org.ietf.jgss.gsscontext1.3 org.ietf.jgss.gsscredential1.4 org.ietf.jgss.gssexception1.5 org.ietf.jgss.gssmanager1.6 org.ietf.jgss.gssname1.7 org.ietf.jgss.MessageProp1.8 Org.ietf.jgss.Oid

"Java Security Technology Exploration Road Series: Java Extensible Security Architecture" Nine: JCP (ii): JCP Class and interface

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellIn J2SE, the JCP API is an extension of JCA, located in the java.security.cert.* package.Java.security.cert.CertPathThe Certpath (certificate path Class) defines an abstract class that represents a certificate chain and a certificate path, and defines all the features associated with the certificate path object.Java.security.cert.CertificateFactoryThe Certificatefactory (Certificate factory Cla

"Java Security Technology Exploration Path series: Java Extensible security Architecture" VI: JCE (ii): JCE Classes and interfaces

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellOne JCE provider classJCE uses the provider class for JCA.Two JCE engine class 2.1 Javax.crypto.CipherThe Cipher (Cryptographic algorithm Class) provides encryption and decryption capabilities for cryptographic algorithms.2.2 Javax.crypto.CipherInputStreamSafe flow.2.3 Javax.crypto.MacThe Mac class provides algorithmic functionality to check the integrity of messages transmitted over the networ

Java Spring Boot VS. Netcore (ix) Spring Security vs. Netcore Security

Talking about security, such as now on the market some OAuth2 \ Oidc-openid Connect, identity authentication, authorization, and so on, the following first Java SecurityThis piece of stuff is a lot more complicated than spring Security or. Netcore Security, 1.1-point comparison noteSpring SecurityPart:Securitycontextho

Java. Lang. classcastexception: Java. Lang. String cannot be cast to javax. Security. Auth. c

The cxf version is 2.6.1. Java code for server callback: Serverauthhandler. Java Package COM. jysd. ms. entity; import Java. io. ioexception; import javax. security. auth. callback. callback; import javax. security. auth. callback. callbackhandler; import javax.

Parse Java architecture's support for information security

Java has three main features: platform independence, network mobility, and security. The Java architecture provides powerful support and assurance for these three features, this article focuses on the principles and usage of the Java architecture to support information security

Java thread security, java thread

Java thread security, java thread I have encountered a lot of questions about thread security recently, such:   Synchronized andWhat is the difference between volatile and volatile?   What is the difference between StringBuilder and StringBuffer? What is the difference between HashMap and HashTable?And so on ...... The

What can be done to make the Java serialization mechanism more secure? Security principles we follow to make Java serialization Safe.__java

Overview Java serialization serialization, we should be not unfamiliar. Its main function is to transform the state of an object into a sequence of bytes to facilitate the persistence of objects or network transmission. The reverse is the reverse process of deserialization. All the developers have to do is implement the Serializable interface and then call the Objectoutputstream/objectinputstream Writeobject/readobject method, and the other work JVM

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.