Our access control mechanism decomposes access control into … the absence of security violations. … [p. 37] Our access control mechanism works by inspecting … and method invocation to inject access control [p. 38] operations into the system. … The operations are (1) explicit protection domain transfers … methods can be invoked and which objects can …
Google-1
Google-2
Copyright clearance needed for quotation.