Thanks for your reply.

For example, Hibernate does not perform any bytecode 
manipulation on its own, but it uses a proxying library that 
creates proxies at the bytecode level.

If you do not manipulate bytecode, 
how do you enforce security policies then?

Regards,
Myoungkyu



Les Hazlewood-2 wrote:
> 
> Hiya,
> 
> The project (now named Shiro) does not perform bytecode manipulation of
> any
> sort.
> 
> Regards,
> 
> Les
> 
> On Sat, Jun 27, 2009 at 11:26 PM, mksong <[email protected]> wrote:
> 
>>
>> Hello, All
>>
>> I am carring out an experiment on JSecurity's bytecode engineering.
>>
>> I tested JSecurity to see if the framework would generate any
>>
>> bytecode related to security or add anything to the existing ones.
>>
>> With the attached log file, I am not sure if JSecurity does bytecode
>> engineering or not.
>> (Here are the log file at loading time and the slide file explaing what I
>> did:
>> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/>
>> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/>)
>>
>> Is it true?
>>
>> --
>> View this message in context:
>> http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3168851.html
>> Sent from the Shiro User mailing list archive at Nabble.com.
>>
>>
> 
> 

-- 
View this message in context: 
http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3170891.html
Sent from the Shiro User mailing list archive at Nabble.com.

Reply via email to