Java uses code signing as a requirement for granting elevated privileges to code. Many security policies permit signed code to operate with privileges that exceed the privileges given to unsigned codeelevated privileges. For example, Java applets can escape the default sandbox restrictions when signed. Consequently, users can grant explicit permissions either to a particular code base or to all code signed by a particular signer. This approach places control of security in the hands of the user, who can choose whether to run an application with full or restricted permissions.
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="09a99189c1c3e43c-9618c59f-4bff4a74-a8738059-ce3ba28de8a6e0dd58f3f183"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | "Adherence to Least Privilege [XYN]" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="eff0ea9d5f043b13-8555ae3c-45dc4085-90ad8141-395f3b5f38cfef41582ddc0c"><ac:plain-text-body><![CDATA[ | [[Dormann 2008 | AA. Bibliography#Dormann 08]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="5712a5061af43cec-4efbafe4-4fd84ee3-87379876-33405983f5330b4c1efc93e2"><ac:plain-text-body><![CDATA[ | [[McGraw 1999 | AA. Bibliography#McGraw 99]] | Appendix C: Sign Only Privileged Code | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="53ac4a0602a89d79-c7133006-40ab4259-b36aa6c9-93e3efac1034c86caea23209"><ac:plain-text-body><![CDATA[ | [[Schneier 2000 | AA. Bibliography#Schneier 00]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
...