Browse by author
Lookup NU author(s): Professor Mark Little, Emeritus Professor Santosh Shrivastava
There are many reasons why applications may require configuration, however the one which dominates Java applications is that of security restrictions. Because an application may be provided different capabilities by different users, it becomes difficult to write ""build-once, run-anywhere"" applications. Insisting that all security sensitive applications execute within controlled or restricted environments may limit the types of application which can be built. Therefore, in this paper we shall describe how we have constructed a configuration infrastructure in Java which allows applications to dynamically adapt themselves to the types of security restrictions that exist when they are executed. Because the system does not change the language it is portable across Java implementations. We shall also describe how we have used this system to build a toolkit for the construction of electronic commerce applications, which allow atomic transactions to span Web browsers and servers.
Author(s): Little MC, Shrivastava SK
Publication type: Report
Publication status: Published
Series Title: Department of Computing Science Technical Report Series
Year: 1998
Pages: 14
Print publication date: 01/05/1998
Source Publication Date: May 1998
Report Number: 653
Institution: Department of Computing Science, University of Newcastle upon Tyne
Place Published: Newcastle upon Tyne
URL: http://www.cs.ncl.ac.uk/publications/trs/papers/653.pdf