Java security, 11 java security – Siemens TC65 User Manual

Page 69

Advertising
background image

TC65 JAVA User's Guide
Strictly confidential / Released

s

TC65 JAVA User's Guide_V05

Page 69 of 90

26.09.2005

11 Java

Security

The Java Security Model follows the specification of IMP 2.0 but does not integrate the
protection domain concept. The protection domain concept is not needed. If the software is
enabled, all domains are available.

Java Security is divided into two main areas:
secure MIDlet data links (HTTPS, Secure Connection) (see chapter 11.1)

execution of signed MIDlets (see chapter 11.2 Execution Control )

Advertising