next up previous
Next: Why bytecodes? Up: Analysis Previous: Analysis

Design

The Java security model is based almost entirely on the ability to verify the downloaded bytecode, the ability to specify and write libraries that prevents undesired access to resources, and the ability of Web browser developers to specify and write code that implements good security policies.






Thu Dec 7 18:26:21 EST 1995