A security term describing a way of controlling access dynamically in a computing system by treating access to objects as provided by a "key" instead of via an "ID Card" (user rights). This is generally more principled, since each object is required to access functionality individually on a lease-per-object basis, while still being able to transfer the use of those leases to other objects during the lease's term.

Page in this topic: coyotos  

Also linked from: Actor   E   EROS   GO!   Hermes   Information-Flow Security   KeyKOS   Microkernel Debate   Sebyla   Security   User Rights   Vault