This figure illustrates a thread of computation that has a chain of multiple callers as multiple method calls that cross protection domain boundaries. Four classes are listed:
c.class belongs to domain A.
a.class belongs to domain B. Each domain has been granted their own set of permissions. The security policy consists of both domains and their permissions.