A runtime execution environment may implement code access security by annotating a delegate to a publisher with a list of potential callers to the publisher. If a permission verification process for at least the listed potential callers results in even one indication of no trust, an exception may be thrown.

 
Web www.patentalert.com

< Icon for a portion of a display screen

> Icon for a portion of a display screen

> Efficient and secure authentication of computing systems

~ 00526