Access Control

Access Control | News, how-tos, features, reviews, and videos

Simplify directory access with Spring LDAP

Why spend all your time handling checked exceptions, closing resources, and looping through NamingEnumerations when you don't have to? The Spring LDAP framework puts the 'l' (for lightweight) back into LDAP programming with JNDI.

Graphs for security

Most programmers are familiar with the access-control list (ACL) as a datastructure used for authorization. This article describes using a more robust structure called an access-control graph (ACG). The ACG has several advantages over...


I want my AOP!, Part 3

In this third and final article in Ramnivas Laddad's aspect-oriented programming (AOP) series, Ramnivas demonstrates how to use AOP and AspectJ to solve real-world problems by modularizing crosscutting concerns. His examples will help...

Access control for partial exposure

With Java's built-in access control, you can't expose fields and methods to some classes in a package, while hiding them from others in the same package. Wally Flint presents a design pattern that helps you gain such partial...

Java security evolution and concepts, Part 4

In Parts 1 through 3 of this series, Raghavan Srinivas discussed network and Java security concepts, including a detailed look at applet security. In this article, the fourth and last in the series, he details the optional, yet...

Java security evolution and concepts, Part 3: Applet security

In Parts 1 and 2 of this series, Raghavan Srinivas discussed concepts of network and Java security. In this third installment, he'll take a look at the challenges of security for, and the deployment of, applets. Get lots of popcorn...

Java security evolution and concepts, Part 2

Since Java code can originate from anywhere in the network, code-centric security is very important for Java development. Whereas Part 1 of this series dealt with network security concepts in general, Part 2 will examine the...

Java security evolution and concepts, Part 1: Security nuts and bolts

This series of articles will provide a general understanding of network security as well as the unique aspects of the Java programming language essential for developers. The design and evolution of the Java platform security and the...

Load More