Study of Java Access Control Mechanism

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1

Abstract

 a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as  encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it  can be accessed only by trusted users.  Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class  often contains a number of interdependent fields that must be in a consistent state. If you allow a users to  manipulate those fields directly, he may change one field without changing important related fields, thus leaving  the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal  use only, hiding these methods prevents users of the class from calling them. The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java defines access control rules that restrict members of a class from being used outside the class that is done through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be  accessed only by trusted users.

Authors and Affiliations

Manhal Mohammad Basher

Keywords

Related Articles

A Short Range Wireless Communication Using Android NFC API

In this paper, we are proposing the implementation of short range wireless communication using Android’s NFC API. Near Field Communication is set of protocols used for communication between two android powered and NFC en...

 Privacy Preserving and Load Balancing For Secure Cloud Storage

 Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...

 Class Diagram Extraction from Textual Requirements Using NLPTechniques

 Abstract: A new method for translating software requirements to object-oriented model is proposed. Softwarerequirements specified in a natural language using scenario like format will be transformed into class diag...

 Cloudburst Predetermination System

Abstract: Cloudburst is a devastating disaster that usually occurs during rainy seasons at Himalayan regions.The recent floods in the ‘Kedarnath’ area, Uttarakhand are a classic example of flash floods in the MandakiniRi...

 Improved Method for Relation Adaptation to Extract the New Relations Efficiently from Relational Mapping

 Abstract: Traditionally, the web contains different semantic relations. The information extraction focuses on pre-specified request from small set of text. The main task of information retrieval is to extract or or...

Download PDF file
  • EP ID EP157376
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

Manhal Mohammad Basher (2013).  Study of Java Access Control Mechanism. IOSR Journals (IOSR Journal of Computer Engineering), 15(1), 59-66. https://europub.co.uk./articles/-A-157376