admin 管理员组文章数量: 1184232
2024年3月21日发(作者:电路output是什么意思)
本科毕业论文
外文文献及译文
文献、资料题目:
Core Java™ Volume II–Advanced
Features
文献、资料来源:
著作
文献、资料发表(出版)日期:
2008.12.1
院 (部):
计算机科学与技术学院
专 业:
网络工程
班 级:
姓 名:
学 号:
指导教师:
翻译日期:
外文文献:
Core Java™ Volume II–Advanced Features
When Java technology first appeared on the scene, the excitement was not about a
well-crafted programming language but about the possibility of safely executing applets that are
delivered over the Internet (see Volume I, Chapter 10 for more information about applets).
Obviously, delivering executable applets is practical only when the recipients are sure that the
code can't wreak havoc on their machines. For this reason, security was and is a major concern of
both the designers and the users of Java technology. This means that unlike other languages and
systems, where security was implemented as an afterthought or a reaction to break-ins, security
mechanisms are an integral part of Java technology.
Three mechanisms help ensure safety:
• Language design features (bounds checking on arrays, no unchecked type conversions,
no pointer arithmetic, and so on).
• An access control mechanism that controls what the code can do (such as file access,
network access, and so on).
• Code signing, whereby code authors can use standard cryptographic algorithms to
authenticate Java code. Then, the users of the code can determine exactly who created the code
and whether the code has been altered after it was signed.
Below, you'll see the cryptographic algorithms supplied in the ty package, which
allow for code signing and user authentication.
As we said earlier, applets were what started the craze over the Java platform. In practice,
people discovered that although they could write animated applets like the famous "nervous text"
applet, applets could not do a whole lot of useful stuff in the JDK 1.0 security model. For
example, because applets under JDK 1.0 were so closely supervised, they couldn't do much good
on a corporate intranet, even though relatively little risk attaches to executing an applet from your
company's secure intranet. It quickly became clear to Sun that for applets to become truly useful,
it was important for users to be able to assign different levels of security, depending on where the
applet originated. If an applet comes from a trusted supplier and it has not been tampered with,
the user of that applet can then decide whether to give the applet more privileges.
- 1 -
版权声明:本文标题:计算机类外文文献翻译---Java核心技术 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.roclinux.cn/b/1710993615a583212.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论