Difference between revisions of "OSGi Concepts Execution Security"
(Created page with '{{Ecl_menu}}<h2>OSGi Security</h2> Life cycle bundle operations are fully protected with the security architecture, making it virtually impossible to be attacked by viruses. The…') |
|||
Line 3: | Line 3: | ||
Life cycle bundle operations are fully protected with the security architecture, making it virtually impossible to be attacked by viruses. The service security model provides an elegant way to secure the communication between bundles passes. | Life cycle bundle operations are fully protected with the security architecture, making it virtually impossible to be attacked by viruses. The service security model provides an elegant way to secure the communication between bundles passes. | ||
− | UBIQUITOUS SECURITY [http://www.osgi.org/About/Technology | + | UBIQUITOUS SECURITY [http://www.osgi.org/About/Technology ] |
+ | |||
Security is based on Java and the Java 2 security model. The language by design limits many possible constructs. For example, buffer overflows used in viruses are impossible. Access modifiers in the language restrict the visibility of the code to other programmers. The OSGiplatform extends this model by allowing private classes, a mechanism that is not available in a standard way in Java. The Java 2 security model provides a comprehensive model to check access by code to resources. The OSGi platform adds full dynamic management of the permissions, simplifying the life of operators and system administrators. | Security is based on Java and the Java 2 security model. The language by design limits many possible constructs. For example, buffer overflows used in viruses are impossible. Access modifiers in the language restrict the visibility of the code to other programmers. The OSGiplatform extends this model by allowing private classes, a mechanism that is not available in a standard way in Java. The Java 2 security model provides a comprehensive model to check access by code to resources. The OSGi platform adds full dynamic management of the permissions, simplifying the life of operators and system administrators. |
Revision as of 13:50, 21 January 2011
Main Page · Course Description · Course Topics · Schedule, Students, Teams · Course Resources · Course Projects
OSGi Security
Life cycle bundle operations are fully protected with the security architecture, making it virtually impossible to be attacked by viruses. The service security model provides an elegant way to secure the communication between bundles passes.
UBIQUITOUS SECURITY [1]
Security is based on Java and the Java 2 security model. The language by design limits many possible constructs. For example, buffer overflows used in viruses are impossible. Access modifiers in the language restrict the visibility of the code to other programmers. The OSGiplatform extends this model by allowing private classes, a mechanism that is not available in a standard way in Java. The Java 2 security model provides a comprehensive model to check access by code to resources. The OSGi platform adds full dynamic management of the permissions, simplifying the life of operators and system administrators.