l4-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Wrapper design patterns (was: Revocation vs destruction)


From: Pierre THIERRY
Subject: Re: Wrapper design patterns (was: Revocation vs destruction)
Date: Tue, 29 Nov 2005 15:17:35 +0100
User-agent: Mutt/1.5.9i

Scribit Jonathan S. Shapiro dies 18/10/2005 hora 15:58:
> In principle, we could do something similar for capabilities that
> travel from one user to another -- any time a capability crosses this
> boundary it's wrapper is replaced. This replacement is implemented by
> a reference monitor.

How does the system knows you cross the boundary? If a process belonging
to a different user gets the capability, how does anyone know it is in
fact a different user?

Curiously,
Nowhere man
-- 
address@hidden
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]