Posts tagged 'hosting'

architecture

Identity 17: Future Warfare may be about Identity

Wars shift from using brute metallic instruments of opression, to ever more (mis)information as a battle force. With a bit of imagination, we can get an idea of the instruments that could be used in future warfare.

>> Continue reading <<

adminstration

Access 5: Juggling Keys in the Rules DB

Access Control is powerful. System-central storage is a bit iffy. How do we stop people from abusive tapping?

>> Continue reading <<

adminstration

Access 4: ARPA2 Access Control for Mail

We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!

>> Continue reading <<

adminstration

Access 3: ARPA2 Access Control and Groups for Admins

Let's say you own a domain name, and have software that uses ARPA2 Access Control. How, then, can you grant or revoke access?

>> Continue reading <<

architecture

Access 2: Shaped like a Matrix

There are two ways of looking at Access Control. One is easy, with a direct relation to the resources being managed. The other is advanced, but like putty in the hands of administrators; moreover, it is highly efficient. Efficiency matters; it allows us to enforce access control everywhere, with no experienced discomfort. We derive the efficient model from the one that is easy to use.

>> Continue reading <<