The figure shows an example of a mapping of code (classes and instances) to their protection domains and then to their permissions.
In this figure, the code is represented by five classes,
The figure has two domains named A and B.
c.class map to domain A while
e.class map to domain B. Each domain maps to its own set of permissions.
The security policy consists of the protection domains and the permissions to which they map.