Statements (52)
Predicate | Object |
---|---|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Java_2_Platform,_Standard_Edition_(J2_SE)_1.3
gptkb:Java_SE_11 |
gptkbp:can_be_extended_by |
Custom algorithms
Custom permissions Custom key stores Security providers |
gptkbp:contains |
Signature class
Access Controller class Key Store class Message Digest class Permission class Security Manager class Privileged Action interface |
https://www.w3.org/2000/01/rdf-schema#label |
java.security
|
gptkbp:is_available_on |
gptkb:Java_1.0
|
gptkbp:is_compatible_with |
gptkb:Java_Enhancement_Proposal
|
gptkbp:is_documented_in |
Java SE documentation
|
gptkbp:is_influenced_by |
Regulatory requirements
Security policies Cryptography principles |
gptkbp:is_maintained_by |
gptkb:Database_Management_System
|
gptkbp:is_part_of |
gptkb:software
gptkb:Java_Enhancement_Proposal |
gptkbp:is_referenced_in |
Security implementations in Java
|
gptkbp:is_standardized_by |
Java security practices
|
gptkbp:is_used_for |
Authentication
Authorization Non-repudiation Data integrity Data confidentiality |
gptkbp:is_used_in |
gptkb:software_framework
gptkb:Cloud_Computing_Service gptkb:Internet_of_Things_(Io_T) Web applications Mobile applications Java applications Enterprise applications |
gptkbp:number_of_cores |
Java security architecture
|
gptkbp:provides |
Secure communication protocols
Access control Digital signatures Key management Cryptographic operations Message authentication Secure random number generation |
gptkbp:supports |
gptkb:Secure_Sockets_Layer_(SSL)
gptkb:public_transportation_system Hash functions Encryption algorithms Public key infrastructure (PKI) |
gptkbp:updates |
gptkb:Java_17
|