Sunday, Full Day
Security in Java 2TM
Convention Ctr – 102B
Marco Pistoia, IBM Corporation

This tutorial is for researchers and developers who want to use Java reliably, securely, and safely. This tutorial covers Java 2TM security, focusing on ClassLoaders, Class File Verifiers, SecurityManagers, and cryptography. Concepts such as ProtectionDomains, Policy, and privileged code will be explained in detail. The tutorial will also cover Java bytecode reverse engineering. Examples and scenarios will provide concrete examples of the technologies involved. This tutorial is based on Mr. Pistoia's latest book, "Java 2 Network Security," published by Prentice Hall PTR.

Presentation Format: Presentation based, with code samples.

Attendee Background: Attendees should be familiar with Java and object-oriented programming.

Marco Pistoia is an Advisory Software Engineer, working at the IBM T. J. Watson Research Center in the Network Interactivity department. He has written nine books and taught classes world-wide on Java, WebSphere and e-business security. Marco's latest book, "Java 2 Network Security," is published by Prentice Hall PTR (ISBN 0-13-015592-6). Marco's interests are in mobile code security, security of collaborative systems, and object-oriented technology.

Tutorials
at a Glance
Tutorials by Track
Full Description
of all Tutorials
Final Program

 OOPSLA'98 Home