Statements (105)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:class
gptkb:security |
gptkbp:can |
Permissions
|
gptkbp:can_be_configured_for |
Java Policy Files
Policy Files System Properties Security policy files |
gptkbp:can_be_customized_with |
gptkb:developers
|
gptkbp:can_be_used_to |
Control Application Behavior
Enforce Security Policies Control Applet Execution Limit Resource Usage Prevent Malicious Code Execution |
gptkbp:can_be_used_to_limit |
Class Permissions
|
gptkbp:can_be_used_to_prevent |
Unauthorized Access
|
gptkbp:can_restrict_access_to |
Network Resources
System Resources |
gptkbp:components |
Java Security Model
|
gptkbp:control_system |
Application Behavior
|
gptkbp:controls |
Class Loading
|
gptkbp:enables |
System property 'java.security.manager'
Command Line Options Setting Security Policy |
gptkbp:enforces |
Access Control Lists
Access control Security Policies Security Constraints Security Policies in Java Applications |
gptkbp:ensures |
Application Integrity
|
gptkbp:feature |
gptkb:Java_EE
gptkb:Java_Development_Kit_(JDK) |
gptkbp:has_limitations |
File Access
Network Access Resource Access Network access System Properties File system access Class Access Process Access Reflection Access Socket Access Thread Access System properties access |
https://www.w3.org/2000/01/rdf-schema#label |
Java Security Manager
|
gptkbp:is_associated_with |
gptkb:Java_Security_Framework
Security Auditing Security Policies Sandboxing Code Signing Runtime Security Java Security Manager API Java Security Manager Class |
gptkbp:is_described_as |
Security Policies
|
gptkbp:is_designed_to |
Prevent Unauthorized Access
|
gptkbp:is_implemented_in |
gptkb:Java_programming_language
gptkb:Java_Language |
gptkbp:is_often_used_in |
gptkb:Java_Virtual_Machine
Java Applications |
gptkbp:is_part_of |
gptkb:Java_SE
gptkb:API gptkb:Java_Runtime_Environment gptkb:Java_Development_Kit_(JDK) gptkb:Java_Security_Framework Java Security Architecture Java Security Model |
gptkbp:is_protected_by |
Malicious Code
Code Injection |
gptkbp:is_related_to |
gptkb:Java_Access_Controller
gptkb:Java_Virtual_Machine gptkb:Java_Security_API Access Control Lists Code Signing Java Access Control Java Security Architecture Java Security Best Practices Java Security Architecture Components Java Security Manager API Java Security Policies |
gptkbp:is_used_by |
Java Applications
|
gptkbp:is_used_for |
Code Security
|
gptkbp:is_used_in |
Enterprise Applications
Java applications Java Applications Web Start Applications |
gptkbp:is_used_to |
Protect Resources
Control Access to System Resources Ensure Safe Execution of Code Manage Security Risks Protect Sensitive Operations Control applet permissions |
gptkbp:management |
gptkb:security
Security Policies User Permissions |
gptkbp:part_of |
gptkb:Java_2_Platform
|
gptkbp:provides |
Access Control
Security policies Permission checks |
gptkbp:replaced_by |
gptkb:Java_17
|
gptkbp:throws |
Security Exception
|
gptkbp:uses |
Permissions
|
gptkbp:bfsParent |
gptkb:Java_SE
gptkb:Java gptkb:Java_2_Platform gptkb:Java_8 |
gptkbp:bfsLayer |
4
|