Berin Loritsch wrote:
> Regarding the ComponentValidator, I am temporarily relenting and 
> moving on. To my knowlege we are all in agreement concerning 
> Logging.  That remains one sore spot to my knowlege *before* we 
> release.

Berin:

I think the points you have made in this thread are 
right-on-the-money!

I think your talking about security concerns in the same way that I 
think about security.  Aside from whatever authentication solution, 
access control mechanisms, trust management and so forth, if your 
building a "valuable" system (i.e. a system handling valuable 
assets), you design and build with the assumption that the system 
WILL-BE-COMPROMISED.  With this presumption there are a variety of 
mechanisms that can employed to hide sensitive resources - but 
achieving this requires defensive code - because you can never 
totally depend on the container because there is always the question 
of compromising the contains container (recursively).  I disagree 
with comments on this thread that this means you have already 
lost the battle - internal subsystems can be much more defensive than 
their containers. But building defensive systems means very rigorous 
enforcement within an object of its operation state - and for that
runtime validation against standard lifecycle semantics is just 
plain good-sense.

Cheers, Steve.




--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to