UP
This section describes the most important kinds of authority.
Section (p2,primary) enumerates
all keys, but see (p1,keydef)
first.
Data Accessing Authority
Authority to Examine and Modify Authority
The constructs that determine the authority of programs
are themselves examinable and modifiable when the appropriate
authority is held. This authority is invoked with the interpretive
aid of the Gnosis kernel. Each such action is done with
a key that designates the authority and authorizes the examination
or change.
Authority to Expend Resources
A program needs this authority to do anything. This authority
is quantitative and expires when the quantity is consumed.
Authority to Call Other Programs
Programs may hold authority to call specific other programs.
In fact authority for specific invocations of other programs
may be held. The other programs that are called typically
have authority beyond that of the caller and may have effects
on the system that the caller could not have had otherwise.
Calling other programs is the way synthetic authority is
exercised. The authority and program logic of the other
program defines the synthetic authority.
Other Authority
Some programs hold authority to use specific parts of
the hardware such as printers and interval timers. These
programs normally hold their authority jealously, but provide
derived services to other programs.