Correct Security
Model Is Essential
Desirable consequences of using a
correct model
Bugs perhaps, but no structural defects (because security check points are already put in place)
Architectural evolution is easier (because it is a simple matter of upgrading the check points)
100% Pure JavaTM is good for security (because security is enforced through the Java Virtual Machine)
Ubiquitous Java deployment is good for security too (because you know what you can depend on)

Return to Tracks