Wars shift from using brute metallic instruments of opression,
to ever more (mis)information as a battle force. With a bit of
imagination, we can get an idea of the instruments that could
be used in future warfare.
There are two ways of looking at Access Control. One is easy, with a
direct relation to the resources being managed. The other is advanced,
but like putty in the hands of administrators; moreover, it is highly
efficient. Efficiency matters; it allows us to enforce access control
everywhere, with no experienced discomfort. We derive the efficient
model from the one that is easy to use.