Study of Java Access Control Mechanism
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users. Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class often contains a number of interdependent fields that must be in a consistent state. If you allow a users to manipulate those fields directly, he may change one field without changing important related fields, thus leaving the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal use only, hiding these methods prevents users of the class from calling them. The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java defines access control rules that restrict members of a class from being used outside the class that is done through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users.
Authors and Affiliations
Manhal Mohammad Basher
A Short Range Wireless Communication Using Android NFC API
In this paper, we are proposing the implementation of short range wireless communication using Android’s NFC API. Near Field Communication is set of protocols used for communication between two android powered and NFC en...
Privacy Preserving and Load Balancing For Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...
Class Diagram Extraction from Textual Requirements Using NLPTechniques
Abstract: A new method for translating software requirements to object-oriented model is proposed. Softwarerequirements specified in a natural language using scenario like format will be transformed into class diag...
Cloudburst Predetermination System
Abstract: Cloudburst is a devastating disaster that usually occurs during rainy seasons at Himalayan regions.The recent floods in the ‘Kedarnath’ area, Uttarakhand are a classic example of flash floods in the MandakiniRi...
Improved Method for Relation Adaptation to Extract the New Relations Efficiently from Relational Mapping
Abstract: Traditionally, the web contains different semantic relations. The information extraction focuses on pre-specified request from small set of text. The main task of information retrieval is to extract or or...