Associate with each object a lock; associate with each process that has access to object a key (it’s a cross between ACLs and C-Lists)
Example: use crypto (Gifford). X object enciphered with key K. Associate an opener R with X. Then: OR-Access: K can be recovered with any Di in a list of n deciphering transformations, so R = (E1(K), E2(K), …, En(K)) and any process with access to any of the Di’s can access the file AND-Access: need all n deciphering functions to get K: R = E1(E2(… En(K) …))