Mapping from Code to Domains and to Permissions
The figure shows an example of a mapping of code (classes and instances) to their protection domains and then to their permissions.
In this figure, the code is represented by five classes, a.class
, b.class
, c.class
, d.class
, and e.class
.
The figure has two domains named A and B. a.class
and c.class
map to domain A while b.class
, d.class
, and e.class
map to domain B. Each domain maps to its own set of permissions.
The security policy consists of the protection domains and the permissions to which they map.