A security system for a computer system provides one or more security domains.
Access to assets registered to the security system is controlled by rights and
privileges. Rights are derived from roles, and each user is assigned one or more
roles. Privileges are attached to assets, and an appropriate combination of rights
and privileges is required before a user is granted the specified type of access
to the asset.