Study of Java Access Control Mechanism

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1

Abstract

 a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as  encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it  can be accessed only by trusted users.  Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class  often contains a number of interdependent fields that must be in a consistent state. If you allow a users to  manipulate those fields directly, he may change one field without changing important related fields, thus leaving  the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal  use only, hiding these methods prevents users of the class from calling them. The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java defines access control rules that restrict members of a class from being used outside the class that is done through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be  accessed only by trusted users.

Authors and Affiliations

Manhal Mohammad Basher

Keywords

Related Articles

 Wireless Controlling Of Remote Electrical Device Using Android Smartphone

 Abstract: Controlling the home appliances and electronics gadgets wirelessly through SmartPhone technology can be more easy. That is, through this paper, we target to control a light emitting device (LED) from any...

 A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network

 The most prominent applications of wireless sensors networks are coverage, Target detection and field surveillance. This paper investigates detection of a target traversing the region being monitored by some nu...

 Monitoring Selfish Nodes in MANET during Replica Allocation

 Abstract: Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this...

Novel Malware Clustering System Based on Kernel Data Structure

Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricas...

An Enhanced Password-Username Authentication System Using Cryptographic Hashing and Recognition Based Graphical Password

Abstract: Password-username authentication is a critical component of today’s web application technology that is commonly used to control access to restricted resources. However, poor design, coding flaws and weakuser lo...

Download PDF file
  • EP ID EP157376
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Manhal Mohammad Basher (2013).  Study of Java Access Control Mechanism. IOSR Journals (IOSR Journal of Computer Engineering), 15(1), 59-66. https://europub.co.uk/articles/-A-157376