Summary
This chapter explained the Java 2 platform architecture and its security features as they apply to building Java applications. In particular, it described the various Java platforms and the core security features that contribute to the end-to-end security of Java-based applications running on various systems—from servers to stand-alone computers, computers to devices, and devices to smart cards. It discussed securing Java applets, JNLP-based Java Web start applications and code obfuscation strategies.
The chapter also described how to use the different security mechanisms, tools, and strategies for implementing the following:
- Java application security
- Java applet security
- Java Web start security
- J2ME Platform security
- Java Card Platform security
- Java code obfuscation
In the next chapter, we will explore the Java extensible security architecture and API mechanisms that allow preserving confidentiality, integrity, authentication, and nonrepudiation in Java-based applications.