. . . "The application will structure the demand in the form AccessType(subject, object) utilizing information made available to it, for example, by the command entered defining the requested access; the identification of the requesting entity (which can be, for example, a user or a system resource such as a workstation or communication line); and the series of entity types making up the object, that i" . . .