Before going down this road, I'd strongly recommend reading Ross
Anderson's paper "Programming Satan's Computer":

http://www.cl.cam.ac.uk/~rja14/Papers/satan.pdf

In addition, Ross has generously put the first edition of his book
"Security Engineering" online:

http://www.cl.cam.ac.uk/~rja14/book.html

The original poster talked about health data, but didn't mention the
trust model. Getting this right is a monumental task and one I
wouldn't approach willingly.

Chris

On Wed, Nov 3, 2010 at 5:11 AM, nicolas.o...@gmail.com
<nicolas.o...@gmail.com> wrote:
> Some things are certainly possible. It depends whether you consider
> all computers to be friendly of
> some of them to be evil.
>
> If all of them are friendly, you can annotate your data by permissions.
>
> Else, you need either to check what you send to other computers, or
> crypt with different keys.
>
> --
> You received this message because you are subscribed to the Google
> Groups "Clojure" group.
> To post to this group, send email to clojure@googlegroups.com
> Note that posts from new members are moderated - please be patient with your 
> first post.
> To unsubscribe from this group, send email to
> clojure+unsubscr...@googlegroups.com
> For more options, visit this group at
> http://groups.google.com/group/clojure?hl=en
>



-- 
| Chris Petrilli
| petri...@amber.org

-- 
You received this message because you are subscribed to the Google
Groups "Clojure" group.
To post to this group, send email to clojure@googlegroups.com
Note that posts from new members are moderated - please be patient with your 
first post.
To unsubscribe from this group, send email to
clojure+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/clojure?hl=en

Reply via email to