Correct Security Model Is Essential |
Desirable consequences of using a correct model |
|
![]() |
Bugs perhaps, but no structural defects (because security check points are already put in place) |
![]() |
Architectural evolution is easier (because it is a simple matter of upgrading the check points) |
![]() |
100% Pure JavaTM is good for security (because security is enforced through the Java Virtual Machine) |
![]() |
Ubiquitous Java deployment is good for security too (because you know what you can depend on) |