This figure illustrates a thread of computation that has a chain of multiple callers as multiple method calls that cross protection
domain boundaries. Four classes are listed: AC.class, file.class, c.class, and a.class. c.class belongs to domain A. a.class belongs to domain B. Each domain has been granted their own set of permissions. The security policy consists of both domains
and their permissions.