[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Opaque storage

From: Pierre THIERRY
Subject: Re: Opaque storage
Date: Wed, 10 Jan 2007 16:45:44 +0100
User-agent: Mutt/1.5.13 (2006-08-11)

Scribit Marcus Brinkmann dies 10/01/2007 hora 09:15:
> This "destined to S" in your proposal appears to be exactly the
> tagging that I proposed.  Don't you think so?

Not at all. It's a consideration for the readers of the scenario to
understand what is happening, and nothing in the system has knowledge of

No tagging takes place in my scenario. Instead, only the graph of
capabilities dictate who is able to use the opaque storage capability.

S is just naturally outside the reference monitor, so when B invokes s1
to send the c1 capability, G substitute c0 to c1, and S receive the
opaque storage capability.

Note that G has no knowledge anywhere of the processes in or out of the
reference monitor. It's only because B in the first place asks A by the
way of G that it receives mediated capabilities.

> To implement identity based access control, when a program A wants to
> proof to a peer B that it has access to an identity without actually
> handing it to B.

And where is identity based access control needed?

Nowhere man
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]