Invoker ID based security

Mauro Migliardi (om@mathcs.emory.edu)
Tue, 18 May 1999 16:26:57 -0400

Date: Tue, 18 May 1999 16:26:57 -0400
From: Mauro Migliardi <om@mathcs.emory.edu>
To: java-security@java.sun.com
Subject: Invoker ID based security

Is there any support for an invoker ID based security scheme?
It seems to me it's possible to fine tune what a piece of code is
allowed to do on the basis of where it comes from but there is no
support to make such a decision on the basis of "who" is trying to
execute it.
The latter is a useful concept in a distributed objects environment.

-- 
Mauro Migliardi, Post Doc Research Associate
E-mail: om@mathcs.emory.edu 
WWW: http://www.mathcs.emory.edu/~om/Mauro.html
Phone: +1 404 727 4975	Fax: +1 404 727 5611
Emory University, Dept. of Math & Computer Science
1784 N. Decatur Road #100, Atlanta, GA 30322, USA