A method, apparatus, and computer instructions for process-based access controls on computer resources to processes. An access mechanism is provided in which a specific invoker obtains an object access identity (ACI). Another mechanism is provided in which a specific object, such as a file system resource, requires a specific object access identity to obtain one of the forms of access denoted by an access control list. A process may "grant" an identifier that is later "required" for a system resource access. Objects may specify their own access requirements and permitted access modes. The granted identifier, ACI, is stored in the process's credentials once these credentials match a specific "grant" entry in the access control list. This identifier has no meaning outside of being used to make an access decision for a specific resource. When a process tries to access the object, the object's access control list is scanned for "required" entries. If a match occurs between the "required" entry's identifier and the ACI stored, access to the object is granted with access rights specified in the "require" entries.

 
Web www.patentalert.com

< Consistent snapshots of dynamic heterogeneously managed data

> Setuid-filter method for providing secure access to a credentials store for computer systems

~ 00443