You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 21 Next »


atomicity : When applied to an operation on primitive data, indicates that other threads that might access the data might see the data as it exists before the operation occurs or after the operation has completed, but may never see an intermediate value of the data.


sanitization : Sanitization is a term used for validating input and transforming it to a representation that conforms to the input requirements of a complex subsystem. For example, a database may require all invalid characters to be escaped or eliminated prior to their storage. Input sanitization refers to the elimination of unwanted characters from the input by means of removal, replacement, encoding or escaping the characters.


canonicalization : Reducing the input to its equivalent simplest known form.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b55b132-c86b-4634-bec4-c1f1cf6089d2"><ac:parameter ac:name=""> normalization</ac:parameter></ac:structured-macro>
normalization : Lossy conversion of the data to its simplest known (and anticipated) form. "When implementations keep strings in a normalized form, they can be assured that equivalent strings have a unique binary representation" [[Unicode 08]].

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfec2326-8191-4d2d-bccc-bc2eb5382b92"><ac:parameter ac:name=""> normalization (URI)</ac:parameter></ac:structured-macro>
normalization (URI) : Normalization is the process of removing unnecessary "." and ".." segments from the path component of a hierarchical URI. Each "." segment is simply removed. A ".." segment is removed only if it is preceded by a non-".." segment. Normalization has no effect upon opaque URIs [[API 06]].

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f55c4e2b-fdb6-4d88-a07a-5319d5b2837b"><ac:parameter ac:name=""> relativization (URI)</ac:parameter></ac:structured-macro>
relativization (URI) : "[Relativization] is the inverse of resolution. For example, relativizing the URI http://java.sun.com/j2se/1.3/docs/guide/index.html against the base URI http://java.sun.com/j2se/1.3 yields the relative URI docs/guide/index.html." [[API 06]].


trusted code : Code that is loaded by the primordial class loader, irrespective of whether it constitutes the Java API or not. In this text, this meaning is extended to include code that is obtained from a known entity and given permissions that untrusted code lacks. By this definition, untrusted and trusted code can coexist in the namespace of a single class loader (not necessarily the primordial class loader). In such cases, the security policy must make this distinction clear by assigning appropriate privileges to trusted code, while denying the same from untrusted code.


untrusted code : Code of unknown origin that can potentially cause some harm when executed. Untrusted code may not always be malicious but this is usually hard to determine automatically. Consequently, untrusted code should be run in a sandboxed environment.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71756b51-613e-4c05-b78c-5d90799ff72e"><ac:parameter ac:name=""> volatile</ac:parameter></ac:structured-macro>
volatile : Declaring a variable volatile ensures that all threads see a consistent value of the variable. Volatile guarantees atomic reads and writes of values, however, it does not guarantee the atomicity of composite operations such as variable incrementation (read-modify-write sequence). "Operations on the master copies of volatile variables on behalf of a thread are performed by the main memory in exactly the order that the thread requested." [[JVMSpec 99]].

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6833741-f887-4514-b865-6cab49766d78"><ac:parameter ac:name=""> vulnerability</ac:parameter></ac:structured-macro>
vulnerability : "A set of conditions that allows an attacker to violate an explicit or implicit security policy" [[Seacord 05]].

  • No labels