Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.lang.java.security > #40

Real work examples of cus

From "towardajavastandard" <towardajavastandard@THRWHITE.remove-dii-this>
Subject Real work examples of cus
Message-ID <1193401935.155494.17850@o80g2000hse.googlegroups.com> (permalink)
Newsgroups comp.lang.java.security
Date 2011-04-27 16:07 +0000
Organization TDS.net

Show all headers | View raw


  To: comp.lang.java.security
To people writing production software:

When, if ever, have you used custom permissions, as described here:
http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2

Is this only effective at providing resource protection for users of
an application? Does it provide any protection against malicious code?

-----
Your response will help in developing a java secure coding standard.

---
 * Synchronet * The Whitehouse BBS --- whitehouse.hulds.com --- check it out free usenet!
--- Synchronet 3.15a-Win32 NewsLink 1.92
Time Warp of the Future BBS - telnet://time.synchro.net:24

Back to comp.lang.java.security | Previous | Next | Find similar


Thread

Real work examples of cus "towardajavastandard" <towardajavastandard@THRWHITE.remove-dii-this> - 2011-04-27 16:07 +0000

csiph-web