Java security, 11 java security – Siemens TC65 User Manual
Page 69
Advertising
TC65 JAVA User's Guide
Strictly confidential / Released
s
TC65 JAVA User's Guide_V05
Page 69 of 90
26.09.2005
11 Java
Security
The Java Security Model follows the specification of IMP 2.0 but does not integrate the
protection domain concept. The protection domain concept is not needed. If the software is
enabled, all domains are available.
Java Security is divided into two main areas:
• secure MIDlet data links (HTTPS, Secure Connection) (see chapter 11.1)
• execution of signed MIDlets (see chapter 11.2 Execution Control )
Advertising