Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Java_Enhancement_Proposal
|
gptkbp:can_be_extended_by |
through custom security providers
|
gptkbp:enables |
secure access to resources
|
https://www.w3.org/2000/01/rdf-schema#label |
Java Security Framework
|
gptkbp:includes |
gptkb:Java_Secure_Socket_Extension_(JSSE)
gptkb:Java_Authentication_and_Authorization_Service_(JAAS) gptkb:Java_Cryptography_Architecture_(JCA) |
gptkbp:is_compatible_with |
gptkb:Java_Security_Manager
gptkb:software gptkb:Java_Runtime_Environment_(JRE) gptkb:Java_Naming_and_Directory_Interface_(JNDI) |
gptkbp:is_designed_for |
Java applications
|
gptkbp:is_documented_in |
Java SE documentation
|
gptkbp:is_implemented_in |
gptkb:language
|
gptkbp:is_influenced_by |
regulatory requirements
security standards industry best practices |
gptkbp:is_maintained_by |
gptkb:Database_Management_System
|
gptkbp:is_part_of |
Java Platform, Enterprise Edition (Java EE)
Java Platform, Standard Edition (Java SE) Java EE security model Java SE security model |
gptkbp:is_supported_by |
community contributions
open-source projects third-party libraries |
gptkbp:is_used_by |
gptkb:software
security professionals system administrators |
gptkbp:is_used_for |
data integrity
data encryption identity management session management penetration testing vulnerability assessment secure data transmission security testing secure application deployment secure authentication secure web services secure AP Is secure authorization |
gptkbp:is_used_in |
enterprise applications
web applications |
gptkbp:provides |
access control
authentication mechanisms secure communication security audits security policies authorization mechanisms cryptographic services |
gptkbp:supports |
digital signatures
role-based access control (RBAC) code signing message digests policy-based security secure random number generation SSL/ TLS protocols attribute-based access control (ABAC) |