SDM employs a set of basic protocols that underly the usages described
in Section 3. SDM delegation protocols specify what information gets
exchanged when an object A invokes a method on object
B. The underlying layer must determine the delegation mode
to be enabled from the context and security requirements attached to
the target (remote reference B). Thus, the security policy
for an intermediate object governs which privileges and delegation
mode to apply at any given context. (See Figure
.)
Different rules apply for each of the combinations of required and
specified modes that can occur in a sequence of invocations from
object A to object B to C. (i.e
A B
C):