see below
> -----Original Message-----
> From: Michael Jenkins [SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, February 25, 1999 2:52 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Primary key
>
> I am afraid that I am not following this discussion. I would appreciate
> some clarifiaction, if you don't mind. It appears to me that Imre is
> claiming that the Java 2 Platform security model allows you to violate
> the encapsulation features that are specified in the Java Language
> Specification.
>
> Are you saying that you can take a class like this:
>
> public class Foo
> {
> private String id;
> public String somethingElse;
>
> public void setSomethingElse( String s )
> {
> somethingElse = s;
> }
>
> ...
> }
>
> and through some security policy setting be able to manipulate the "id"
> String? I'm either grossly misunderstanding your point or else you'll
> have to show me where this mechanism is described.
>
[Chip Wilson]
http://www.javasoft.com/products/jdk/1.2/docs/guide/reflection/reflection.ht
ml
===========================================================================
To unsubscribe, send email to [EMAIL PROTECTED] and include in the body
of the message "signoff EJB-INTEREST". For general help, send email to
[EMAIL PROTECTED] and include in the body of the message "help".