|
|
|
Jini
Technology Infrastructure: Distributed Security
|
|
|
|
Jini
technology’s Distributed Security model builds on the Java Virtual
Machine. It is a Remote Method
Invocation (RMI) -based security mechanism that adds a twin notion of principal
and access control lists.
|
|
Jini technology
services are accessed on behalf of some entity — the principal — which
generally traces back to a particular user of the system. Services themselves
may request access to other services based on the identity of the object that
implements the service. Whether access to a service is allowed depends on the
contents of an access control list that is associated with the object.
|
|
|