All > Technology > Programming > Java
Comprises a number of cooperating system components, ranging from security managers that execute as part of the application, to security measures designed into the Java virtual machine and the language itself. The sandbox ensures that an untrusted, and possibly malicious, application cannot gain access to system resources.
Also listed in:
All > Technology > Programming > Java
Simple API for XML. An event-driven, serial-access mechanism for accessing XML documents.
- See Simple API for XML.
- Browse Related Terms: comment, content, DDP, Error, fatal error, JSP document, prolog, SAX, Schema, Simple API for XML, valid, validating parser, Warning, well-formed, XLink, XPath, XPointer
All > Technology > Programming > Java
The part of the Java Virtual Machine (JVM) that is responsible for managing threads.
- Browse Related Terms: big-endian, CVM (Compact Virtual Machine), JVM, KVM (Kilobyte Virtual Machine), little-endian, scheduler, Thread, virtual machine
Also listed in:
All > Technology > Programming > Java
- A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.
- Browse Related Terms: comment, content, DDP, Error, fatal error, JSP document, prolog, SAX, Schema, Simple API for XML, valid, validating parser, Warning, well-formed, XLink, XPath, XPointer
Also listed in:
All > Technology > Programming > Java
See protocol.
- Browse Related Terms: File Transfer Protocol, FTP, HTTP, HTTP (HyperText Transfer Protocol), HTTPS, HTTPS (Hyper Text Transfer Protocol Secure sockets), IIOP, Java Secure Socket Extension (JSSE), ORB, scheme, Secure Socket Layer (SSL), SOAP (Simple Object Access Protocol), well-known port
All > Technology > Programming > Java
A characteristic of an identifier that determines where the identifier can be used. Most identifiers in the Java programming environment have either class or local scope. Instance and class variables and methods have class scope; they can be used outside the class and its subclasses only by prefixing them with an instance of the class or (for class variables and methods) with the class name. All other variables are declared within methods and have local scope; they can be used only within the enclosing block.
A language's scope rules determine how widely variables, methods and classes are visible within a class or program. Local variables have a scope limited to the block in which they are defined, for instance. Private methods and variables have class scope, limiting their accessibility to their defining class. Java provides private, package, protected and public visibility.
- Browse Related Terms: Block, class scope, cohesion, fully qualified class name, interpretational inner class, nested class, protected access, public interface, scope, subordinate inner class
Also listed in:
- All > Law > Intellectual Property
- All > Technology > Collaboration > SharePoint
- All > Technology > Programming > Perl
- All > Technology > Search > Enterprise Search
All > Technology > Programming > Java
A Software Development Kit (SDK) is a set of tools used to develop applications for a particular platform. An SDK typically contains a compiler, linker, and debugger. It may also contain libraries and documentation for APIs.
- Browse Related Terms: IDE (Integrated Development Environment), Java, Java 2 SDK, Standard Edition, Java APIs for Integrated Networks (JAIN), Java Card API, Java Development Kit (JDK), Java Platform, Java Runtime Environment (JRE), JCP (Java Community Process), JDK, JRE, SDK (Software Development Kit), stack trace, Universal Description, Discovery and Integration (UDDI) project
All > Technology > Programming > Java
A list of folders (directories) to be searched - for a program or class, for instance.
- Browse Related Terms: anonymous class, API, application programming interface (API), core class, Instance, instantiation, JFC, NEW, new operator, no-arg constructor, non-static nested class, object construction, search path, throw, type
All > Technology > Programming > Java
A protocol that allows communication between a Web browser and a server to be encrypted for privacy.
- A technology that allows Web browsers and Web servers to communicate over a secured connection.
- Browse Related Terms: File Transfer Protocol, FTP, HTTP, HTTP (HyperText Transfer Protocol), HTTPS, HTTPS (Hyper Text Transfer Protocol Secure sockets), IIOP, Java Secure Socket Extension (JSSE), ORB, scheme, Secure Socket Layer (SSL), SOAP (Simple Object Access Protocol), well-known port
All > Technology > Programming > Java
A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol.
- A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both.
- Browse Related Terms: caller, credentials, deadlock, naming context, privilege, Security attributes, security context, server principal
Also listed in:
All > Technology > Programming > Java
- A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Programming > Java
An object that encapsulates the shared state information regarding security between two entities.
- An object that encapsulates the shared state information regarding security between two entities.
- Browse Related Terms: caller, credentials, deadlock, naming context, privilege, Security attributes, security context, server principal
Also listed in:
All > Technology > Programming > Java
- A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.
- Browse Related Terms: application client, application client container, callback methods, Component, component contract, component-managed sign-on, container, Enterprise JavaBeans (EJB), life cycle (J2EE component), naming environment, Sandbox, security permission, security permission set, software reuse, Web container
All > Technology > Programming > Java
- The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.
- Browse Related Terms: application client, application client container, callback methods, Component, component contract, component-managed sign-on, container, Enterprise JavaBeans (EJB), life cycle (J2EE component), naming environment, Sandbox, security permission, security permission set, software reuse, Web container
All > Technology > Programming > Java
A policy used to limit access by an applet to the resources of a host system.
- Browse Related Terms: hostname, JSP container, JSP container, distributed, Security Policy, servlet container, distributed, virtual host, Web application, distributable, Web container, distributed, Web server
Also listed in:
- All > Technology > Defense
- All > Technology > Security
- All > Technology > Telecommunications
All > Technology > Programming > Java
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has the following characteristics: It has a collection of users (or principals). It uses a well defined authentication protocol(s) for authenticating users (or principals). It may have groups to simplify setting of security policies.
- A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Programming > Java
- See role (security).
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Programming > Java
A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
- A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Programming > Java
- The set of security roles defined by the application assembler.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Programming > Java
An error in the meaning of program. A statement may have no syntax errors, but might still break the rules of the Java language. For instance, if
ivar
is anint
variable, the following statement is syntactically correctivar = true;
However, it is semantically incorrect, because it is illegal to assign aboolean
value to an integer variable.- Browse Related Terms: boundary error, Catch, finally, runtime error, semantic error, SQL/J, syntax error