Browse by author
Lookup NU author(s): Professor Mark Little, Dr Stuart Wheater
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
There are many reasons why applications may require configuration, however the one which dominates Java applications is that of security restrictions. Because an application may be provided different capabilities by different users, it becomes difficult to write “build-once, run-anywhere” applications. Insisting that all security sensitive applications execute within controlled or restricted environments may limit the types of application which can be built. Therefore, in this paper we shall describe how we have constructed a configuration infrastructure in Java which allows applications to dynamically adapt themselves to the types of security restrictions that exist when they are executed. Because the system does not change the language it is portable across Java implementations. We shall also describe how we have used this system to build a toolkit for the construction of electronic commerce applications, which allow atomic transactions to span Web browsers and servers.
Author(s): Little MC, Wheater SM
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: 4th IEEE International Conference on Configurable Distributed Systems (ICCDS '98)
Year of Conference: 1998
Pages: 172-179
Publisher: IEEE Computer Society
Library holdings: Search Newcastle University Library for this item
ISBN: 0818684518