Delegation Protocols Check out the new USENIX Web site.



next up previous
Next: A does not Up: Secure Delegation for Distributed Previous: Delegation Certificates

Delegation Protocols

SDM employs a set of basic protocols that underly the usages described in Section 3. SDM delegation protocols specify what information gets exchanged when an object A invokes a method on object B. The underlying layer must determine the delegation mode to be enabled from the context and security requirements attached to the target (remote reference B). Thus, the security policy for an intermediate object governs which privileges and delegation mode to apply at any given context. (See Figure gif.)

Different rules apply for each of the combinations of required and specified modes that can occur in a sequence of invocations from object A to object B to C. (i.e A B C):





Nataraj Nagaratnam
Mon Mar 16 18:02:57 EST 1998