composite
composite copied to clipboard
Access control bits to constrain resource operations
We want to indicate which operations can be performed on each resource, and have them be subset upon delegation. This simply adds finer-grained access control.