Date: Tue, 18 May 1999 16:26:57 -0400
From: Mauro Migliardi <om@mathcs.emory.edu>
To: java-security@java.sun.com
Subject: Invoker ID based security
Is there any support for an invoker ID based security scheme?
It seems to me it's possible to fine tune what a piece of code is
allowed to do on the basis of where it comes from but there is no
support to make such a decision on the basis of "who" is trying to
execute it.
The latter is a useful concept in a distributed objects environment.
-- Mauro Migliardi, Post Doc Research Associate E-mail: om@mathcs.emory.edu WWW: http://www.mathcs.emory.edu/~om/Mauro.html Phone: +1 404 727 4975 Fax: +1 404 727 5611 Emory University, Dept. of Math & Computer Science 1784 N. Decatur Road #100, Atlanta, GA 30322, USA