This figure illustrates a thread of computation that has a chain of multiple callers as multiple method calls that cross protection
domain boundaries. Four classes are listed: AC.class
, file.class
, c.class
, and a.class
. c.class
belongs to domain A. a.class
belongs to domain B. Each domain has been granted their own set of permissions. The security policy consists of both domains
and their permissions.