摘要 |
A system and method for controlling the usage of data objects in component object systems. According to the invention, each data object includes a peer list that defines one or more peer data objects that are required by the data object. Upon receipt of a data object, the system verifies the integrity of the data object. Further, the system identifies the integrity of the peer data objects. If the system cannot find the peer data objects, or the system cannot authenticate the peer data objects, the system may optionally retrieve a peer data object that can be authenticated from a data object depository. In addition to validating the integrity of the data object, the system verifies that the data object is authorized to communicate with each of the peer data objects. Further, the system verifies that the peer data objects are authorized to communicate with the data object. |