Before going down this road, I'd strongly recommend reading Ross Anderson's paper "Programming Satan's Computer":
http://www.cl.cam.ac.uk/~rja14/Papers/satan.pdf In addition, Ross has generously put the first edition of his book "Security Engineering" online: http://www.cl.cam.ac.uk/~rja14/book.html The original poster talked about health data, but didn't mention the trust model. Getting this right is a monumental task and one I wouldn't approach willingly. Chris On Wed, Nov 3, 2010 at 5:11 AM, nicolas.o...@gmail.com <nicolas.o...@gmail.com> wrote: > Some things are certainly possible. It depends whether you consider > all computers to be friendly of > some of them to be evil. > > If all of them are friendly, you can annotate your data by permissions. > > Else, you need either to check what you send to other computers, or > crypt with different keys. > > -- > You received this message because you are subscribed to the Google > Groups "Clojure" group. > To post to this group, send email to clojure@googlegroups.com > Note that posts from new members are moderated - please be patient with your > first post. > To unsubscribe from this group, send email to > clojure+unsubscr...@googlegroups.com > For more options, visit this group at > http://groups.google.com/group/clojure?hl=en > -- | Chris Petrilli | petri...@amber.org -- You received this message because you are subscribed to the Google Groups "Clojure" group. To post to this group, send email to clojure@googlegroups.com Note that posts from new members are moderated - please be patient with your first post. To unsubscribe from this group, send email to clojure+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/clojure?hl=en