没有合适的资源?快使用搜索试试~ 我知道了~
JDK10-JSE ,Security Developer’s Guide-827.pdf
需积分: 5 0 下载量 162 浏览量
2023-08-08
08:47:33
上传
评论
收藏 4.99MB PDF 举报
温馨提示
试读
827页
JDK10-Java Platform, Standard Edition ,Security Developer’s Guide-827
资源推荐
资源详情
资源评论
Java Platform, Standard Edition
Security Developer’s Guide
Release 10
E91076-01
March 2018
Java Platform, Standard Edition Security Developer’s Guide, Release 10
E91076-01
Copyright © 1993, 2018, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify,
license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means.
Reverse engineering, disassembly, or decompilation of this software, unless required by law for
interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software,
any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are
"commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-
specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the
programs, including any operating system, integrated software, any programs installed on the hardware,
and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron,
the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro
Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be
responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
Preface
Audience xx
Documentation Accessibility xx
Related Documents xx
Conventions xx
1
General Security
Java Security Overview 1-1
Introduction to Java Security 1-1
Java Language Security and Bytecode Verification 1-2
Basic Security Architecture 1-3
Security Providers 1-3
File Locations 1-5
Java Cryptography 1-6
Public Key Infrastructure 1-7
Key and Certificate Storage 1-7
Public Key Infrastructure Tools 1-8
Authentication 1-9
Secure Communication 1-10
SSL, TLS, and DTLS Protocols 1-11
Simple Authentication and Security Layer (SASL) 1-11
Generic Security Service API and Kerberos 1-12
Access Control 1-12
Permissions 1-12
Security Policy 1-13
Access Control Enforcement 1-14
XML Signature 1-15
Additional Information about Java Security 1-16
Java Security Classes Summary 1-16
Deprecated Security APIs Marked for Removal 1-18
Security Tools Summary 1-19
Built-In Providers 1-20
iii
Java SE Platform Security Architecture 1-20
Introduction 1-20
The Original Sandbox Model 1-20
Evolving the Sandbox Model 1-22
Protection Mechanisms – Overview of Basic Concepts 1-23
Permissions and Security Policy 1-25
The Permission Classes 1-25
java.security.CodeSource 1-34
java.security.Policy 1-34
java.security.GeneralSecurityException 1-45
Access Control Mechanisms and Algorithms 1-46
java.security.ProtectionDomain 1-46
java.security.AccessController 1-46
Inheritance of Access Control Context 1-50
java.security.AccessControlContext 1-51
Secure Class Loading 1-53
Class Loader Class Hierarchies 1-53
The Primordial Class Loader 1-53
Class Loader Delegation 1-54
Class Resolution Algorithm 1-54
Security Management 1-55
Managing Applets and Applications 1-55
SecurityManager versus AccessController 1-56
Auxiliary Tools 1-57
GuardedObject and SignedObject 1-58
java.security.GuardedObject and java.security.Guard 1-58
java.security.SignedObject 1-59
Discussion and Future Directions 1-60
Resource Consumption Management 1-60
Arbitrary Grouping of Permissions 1-60
Object-Level Protection 1-61
Subdividing Protection Domains 1-61
Running Applets with Signed Content 1-61
Appendix A: API for Privileged Blocks 1-62
Using the doPrivileged API 1-62
What It Means to Have Privileged Code 1-67
Reflection 1-68
Appendix B: Acknowledgments 1-69
Appendix C: References 1-69
Standard Algorithm Names 1-70
Permissions in the JDK 1-70
iv
Permission Descriptions and Risks 1-71
Methods and the Permissions They Require 1-72
java.lang.SecurityManager Method Permission Checks 1-91
Default Policy Implementation and Policy File Syntax 1-94
Default Policy Implementation 1-95
Default Policy File Locations 1-95
Modifying the Policy Implementation 1-97
Policy File Syntax 1-97
Policy File Examples 1-102
Property Expansion in Policy Files 1-104
Windows Systems, File Paths, and Property Expansion 1-105
General Expansion in Policy Files 1-106
Appendix A: FilePermission Path Name Canonicalization Disabled By Default 1-108
Troubleshooting Security 1-109
2
Java Cryptography Architecture (JCA) Reference Guide
Introduction to Java Cryptography Architecture 2-1
JCA Design Principles 2-2
Provider Architecture 2-3
Cryptographic Service Providers 2-3
How Providers Are Actually Implemented 2-5
Keystores 2-7
Engine Classes and Algorithms 2-7
Core Classes and Interfaces 2-8
The Provider Class 2-9
How Provider Implementations Are Requested and Supplied 2-10
Installing Providers 2-12
Provider Class Methods 2-12
The Security Class 2-13
Managing Providers 2-14
Security Properties 2-15
The SecureRandom Class 2-15
Creating a SecureRandom Object 2-16
Seeding or Re-Seeding the SecureRandom Object 2-16
Using a SecureRandom Object 2-17
Generating Seed Bytes 2-17
The MessageDigest Class 2-17
Creating a MessageDigest Object 2-17
Updating a Message Digest Object 2-18
Computing the Digest 2-18
v
剩余826页未读,继续阅读
资源评论
weixin_40191861_zj
- 粉丝: 63
- 资源: 1万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功