Mill Computing, Inc. Forums The Mill Architecture Granting, Revoking, and Collusion Reply To: Granting, Revoking, and Collusion

williammlleslie
Participant
Post count: 2

That makes sense, thanks for your reply.

I’m looking forward to hearing more on that subject – for example, as a service implementer, if I am given a grant and a pointer, I’d need to be able to check that the pointer is within the range of that grant rather than into my own data, or that of services I’ll need to use.

I can’t think of any other obvious questions about this by looking at the security literature I have handy, so I’ll look forward to the next installment (and to The Mill, of course).