作者:empty 页数:891 出版社:empty |
Then lerma in cont ned herein is subjec l to change wihout nace and is not warranted tabe error dree.Ifyou nd any err ars, please reparthemiossiwitngif this s software or related documentation that is delivered to the U.S.Gave rn mentor anyone licens ng it onbehalf of the U.S.Government, then the folowing npt ice is applicable:U.S.GOVERNMENTENDUSERS:Oracleprograms{inoludinganyoperatingsystem, integrated software,users are commercial computer software or“commercial computer sotware documentation'pursuant to theapp i cable Federal Acquisition Regulat on and agency-specific supplemen al regulations.As such, the use,re product on, dup ication, release.display, disclosure, modication, prep a/ation of deriva tv e works, and/orcomputer documentation and for i) other Oracle data, is subject to then ghts and limitations speci tied in thei cense contained in the appe cable contract.The terms governing the U.S.Government'suse of Oracle cloudserices are de tined by the app i cable contract for such services.No other ng hts are granted to the U.5.GovemmentThis son ware or hardware is developed for general use in avait y of info mm at on management appic a ons.safe use.Or a de Corporation and its a fliatesdsclamanyliabiity for any damages caused by use of thissoftware or hardware in dangerous applications.ahammanceredioearedtade marks of Oradea ndorssatateOhernaesmybeIntel and Intel Inside are trademarks or registered trademarks of Intel Car poration.All SPARC trademarks areused under i cense and are trademark sort eg istered trademarks of SPARC International Inc.AMD.E pyc.This software or hardware and document ab on may provide as cess to or infer mation about can tent, products,and services from third parties.Oracle Corporation and its amli ates are not respons ble for and expresslydisclaim all warranties of any kind wth respect to third-party content.products.and services unless otherwiseresponsible for any loss, costs, or damages incurred due to your access to or use of third-party content,products, or services, except asset forth in an applicable agreement between you and Or ace
Preface
Audience
Dcumentatin Accessibility
Diversity and Inclusin
Related Dcuments
Cnventins
1General Security
Terms and Definitins
Java Security verview
Intrductin t Java Security
Intrductin
The riginal Sandbx Mdel
Evlving the Sandbx Mdel
Java Language Security and Bytecde Verifica in
Basic Security Architecture
Security Prviders
Java Cryptgraphy
PublicKey Infrastructure
Key and Certificate Strage
PublicKey Infrastructure Tls
Authenticatin
Secure Cmmunicatin
TLS and DTLS Prtcls
Simple Authenticatin and Security Layer(SASL)
Generic Security Service APland Kerbers
AccessCntrl
Permissins
Security Plicy
AccessCntrl Enfrcement
XML Signature
Java API fr XML Prcessing(JAXP)
Security Tls Summary
Built-In Prviders
Java SE Platfrm Security Architecture
RACLE
Prtectin Mechanisms-verview f Basic Cncepts
Permissins and Security Plicy
The Permissin Classes
java.security.Cde Surce
java.security.Plicy
java.security.Access Cntrller
Aux ii ary Tls
java.security.General SecurityExceptin
AccessCntrl Mechanisms and Algrithms
java.security.Prtectin Dmain
Inheritance f AccessCntrl Cntext
java.security.AccessCntrl Cntext
Secure ClassLading
ClassLader Class Hierarchies
The Primrdial ClassLader
ClassLader Delegatin
Class Reslutin Algrithm
Security Management
Managing Applets and Applicatins
SecurityManager versus Access Cntrller
Guarded bject and Signed bject
java.security.Guarded bject and java.security.Guard
java.security.Signed bject
Discussin and Future Directins
Resurce Cnsumptin Management
Arb trary Gruping f Permissins
bject-Level Prtectin
Subdividing Prtectin Dmains
Running Applets with Signed Cntent
Appendix A:API fr Privileged Blcks
Using the d Privileged API
What It Means t Have Privileged Cde
Reflectin
Appendix B:Acknwledgments
Appendix C:References
Standard Algrithm Names
Permissins in the JDK
Permissin Descriptins and Risks
Methds and the Permissins They Require
Initializing a Signature bject
Verifying with a Signature bject
java.lang.SecurityManager Methd Permissin Checks
JDK Supprted Permissins
Default Plicy Im pie mentatin
Default Plicy File Lcatins
Mdifying the Plicy Implementatin
Plicy File Syntax
Plicy File Examples
Prperty Expansin in Plicy Files
General Expansin in Plicy Files
Prvider Architecture
Cryptgraphic Service Prviders
Hw Prviders Are Actually Implemented
Key stres
The Prvider Class
Hw Prvider Implementatins Are Requested and Supplied
Install ng Prviders
Prvider Class Methds
The Security Class
Managing Prviders
Security Prperties
Creating a SecureRandm bject
Seeding r Re-Seeding the SecureRandm bject
Using a SecureRandm bject
Generating Seed Bytes
The Message Digest Class
Creating a Message Digest bject
Updating a Message Digest bject
Cmputing the Digest
The Signature Clas 5
Signature bject States
Creating a Signature bject
Signing with a Signature bject
The Cipher Stream Classes
The Sealed bjectClass
Key Spec ficatin Interfaces and Classes
The Key Spec Interface
The Key Spec Subinterfaces
The Encded Key Spec Class
The Key Factry Class
The Secret Key Factry Class
The KeyPair Generatr Class
The KeyGeneratr Class
The KeyStre Class
The Algr thm Parameter Spec Interface
The Algrithm Parameters Class
The Algrithm Parameter Generatr Class
The Cerf icate Factry Class
Generating a Pair f Keys
Default Plicy Implementatin and Plicy File Syntax
Windws Systems, File Paths, and Prperty Expansin
Intrductin t Java Cryptgraphy Architecture
JCA Design Principles
Engine Classes and Algrithms
Cre Classes and Interfaces
The SecureRandm Class
The Cipher Class
ther Cipher-based Classes
The MacCla5s
Key Interfaces
The KeyPair Class
Generatrs and Factries
The Key Agreement Class
Key Management
A igr thm Parameters Classes
Hw the JCA Might Be Used in a SSL/TLS Implementatin
Cryptgraphic Strength Cnfiguratin
Jurisdictin Plicy FileFrmat
Hwt Make Applicatins Exempt frm Cryptgraphic Restrict ns
Standard Names
Packaging Yur Applicatin
Additinal JCA Cde Samples
Cmputing a Message Digest bject
Generati