In fact, if you were to trace this algorithm, you would realize that it builds a list of all the possible stack configurations and the transitions between them.
事实上,如果跟踪该算法的过程,就会认识到它构建一个所有可能的堆栈配置以及在这些配置间的转换的列表。
2
This call leads to essentially the same algorithm being executed, but on the call stack encapsulated in this AccessControlContext (belonging to the client).