Mill Computing, Inc. › Forums › The Mill › Architecture › Granting, Revoking, and Collusion › Reply To: Granting, Revoking, and Collusion
June 18, 2015 at 4:08 am
Post count: 2
That makes sense, thanks for your reply.
I’m looking forward to hearing more on that subject – for example, as a service implementer, if I am given a grant and a pointer, I’d need to be able to check that the pointer is within the range of that grant rather than into my own data, or that of services I’ll need to use.
I can’t think of any other obvious questions about this by looking at the security literature I have handy, so I’ll look forward to the next installment (and to The Mill, of course).