l4-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Design principles


From: Jonathan S. Shapiro
Subject: Re: Design principles
Date: Mon, 15 Jan 2007 12:27:39 -0500

On Mon, 2007-01-15 at 18:26 +0100, Marcus Brinkmann wrote:

> Well, in this case I have the upper hand in the discussion, because we
> definitely have exciting and convincing evidence that mutually
> suspicious collaboration can and will happen in transparent computer
> systems.  As a primary example, I cite Wikipedia, which has strong
> security without opaqueness.  (If you want an example at the operating
> system level, I cite the Incompatible Timesharing System, ITS,
> although that is less convincing because it comes from a time where
> the computing environment was quite different.  Still the similarities
> to Wikipedia's security mechanisms are all too obvious, so it has to
> be mentioned).

An interesting assertion. What are Wikipedia's security mechanisms?

-- 
Jonathan S. Shapiro, Ph.D.
Managing Director
The EROS Group, LLC
+1 443 927 1719 x5100





reply via email to

[Prev in Thread] Current Thread [Next in Thread]